On July 9th, 1999 submitted to, and attorney docket is A-21506, and name is called the U.S. Patent application of " wireless point-to-multipoint (PtMP) transmission system structure of paying attention to service quality (QoS) ".
On July 9th, 1999 submitted to, and attorney docket is A-21507, and name is called the U.S. Patent application of " method that Dynamic Bandwidth Allocation is provided according to the IP properties of flow " in wireless point-to-multipoint (PtMP) transmission system.
On July 9th, 1999 submitted to, and attorney docket is A-21508, and name is called the U.S. Patent application of " providing the method that flows based on service quality (QoS) process IP in wireless points in multicast system ".
On July 9th, 1999 submitted to, and attorney docket is A-21509, and name is called the U.S. Patent application of " wireless points is identified to the IP stream in the multicast system ".
On July 9th, 1999 submitted to, and attorney docket is A-21510, and name is called the U.S. Patent application of " the feature statement of the IP stream in wireless point-to-multipoint (PtMP) transmission system ".
On July 9th, 1999 submitted to, and attorney docket is A-21511, and name is called the U.S. Patent application of " classification of the IP stream in wireless point-to-multipoint (PtMP) transmission system ".
On July 9th, 1999 submitted to, and attorney docket is A-21512, and name is called the U.S. Patent application of " priority arrangement of the IP stream in wireless point-to-multipoint (PtMP) transmission system ".
On July 9th, 1999 submitted to, and attorney docket is A-21513, and name is called the U.S. Patent application of " method of operating that arranges priority based on service-level agreements (SLA) is provided " in wireless point-to-multipoint (PtMP) transmission system.
On July 9th, 1999 submitted to, and attorney docket is A-21514, and name is called the U.S. Patent application of " method of utilizing link-layer acknowledgment control transmission control protocol (TCP) speed in wireless point-to-multipoint (PtMP) transmission system ".
On July 9th, 1999 submitted to, attorney docket is A-21532, and name is called the U.S. Patent application of " QoS in media access control (MAC) layer in wireless point-to-multipoint (PtMP) transmission system centered by transmission control protocol/Internet protocol (TCP/IP) ".
On July 9th, 1999 submitted to, and attorney docket is A-21533, and name is called the U.S. Patent application of " being used for optimization to the scheduling utilization of the Priority-based of the sensitive IP stream of stand-by period and shake in wireless points in multicast system ".
On July 9th, 1999 submitted to, and attorney docket is A-21534, and name is called the U.S. Patent application of " being used for wireless points to TDMA/TDD (TDMA/TDD) cut-in method of multicast system ".
Submitted on July 9th, 1999, attorney docket is A-21535, and name is called the U.S. Patent application of " be used for wireless transmission in the multicast system in wireless points the sensitive IP stream of stand-by period and shake arranged priority based on reserving ".
On July 9th, 1999 submitted to, attorney docket is A-21536, and name is called the U.S. Patent application of " internet being arranged Internet protocol (IP) stream of priority to translate into the wireless system resources distribution in wireless point-to-multipoint (with PtMP) transmission system ".
On July 9th, 1999 submitted to, attorney docket is A-21539, and name is called the U.S. Patent application of " method of operating that the IP stream of differentiated services (DiffServ) mark is integrated into service quality (QoS) priority in wireless point-to-multipoint (PtMP) transmission system ".
Submitted on July 9th, 1999, attorney docket is A-21540, and name is called the U.S. Patent application of " by the method for the identification of wireless point-to-multipoint (PtMP) transmission system and the Virtual Private Network (VPN) that operates ".
On July 9th, 1999 submitted to, and attorney docket is A-21541, and name is called the U.S. Patent application of " air frame of TDMA/TDD (TDMA/TDD) transmission medium Access Control (MAC) ".
On July 9th, 1999 submitted to, and attorney docket is A-21542, and name is called the U.S. Patent application of " media access control (MAC) layer of paying attention to application, service quality (QoS) sensitivity ".
Submitted on July 9th, 1999, attorney docket is A-21543, and name is called the U.S. Patent application of " transmission control protocol/Internet protocol (TCP/IP) is with the transmission system structure of the wireless point-to-point (PtP) that is grouped into the center ".
On July 9th, 1999 submitted to, and attorney docket is A-21547, and name is called the U.S. Patent application of " transmission control protocol/Internet protocol (TCP/IP) is with the transmission system structure of the cable that is grouped into the center point-to-multipoint (PtMP) ".
Detailed description of preferred embodiment
VII. example environment
The present invention describes according to example environment. Fixing wireless point-to-multipoint (PtMP) of this example environment utilization connects to transmit the data message of grouping, and this data message comprises IP phone, video, the data of for example receiving from communication carrier. As used herein, communication carrier can comprise the domestic entity of US (referring to following definition at part II) that those skilled in the art can identify for example ILECs, CLECs, IXCs, NGTs and enhanced service provider (ESPs), and global entity for example PTTs and NEs. In addition, as used herein, a kind of communication system comprises for example ILECs, CLECs, IxCs and used national system and the global system of enhanced service provider (ESPs) entity that those skilled in the art can identify.
In a preferred embodiment, communication service connects arrival from wide area network (WAN). Data, services receives also and can be demodulated into for example peer-peer protocol (PPP) from Internet protocol (IP) form from data network by network router. Network router can for example comprise all-purpose computer, for example routing software or the special-purpose routing arrangement of SUN work station operation, the SanJose of CISCO for example, the Alameda of CA, ASCEND, the Alameda of CA, NETOPIA, the SantaClara of CA or 3COM, the various models of CA.
In another kind of scheme, for example the Virtual Private Network of (Point to Point Tunnel Protocol (PPTP)) is used in and produces " tunnel " between long-distance user and the company data net. The tunnel allows the network manager to expand Virtual Private Network from server (for example WindowsNT server) to data network (for example internet).
Although the present invention describes according to this example environment, then important it should be noted that just provides a description with these terms for illustrative purposes. The present invention does not expect to limit to for this reason accurate interoperability between example environment or the said apparatus. In fact, after the description below reading, how those skilled in the relevant art realize that at other environment the present invention will become clearly.
VIII. definition
The following common communication term of table 1 definition. These terms are used for the remainder of the whole specification of the present invention.
Table 1
Term | Definition |
Network access tandem exchange (AT) | AT is the 3/4 class switch of calling out for conversion between the EOs of LATA. AT is provided to user's access of IXCs, so that the trunk call service to be provided. Entering innings tandem exchange is a network node. Other network node can for example comprise that CLEC or other enhanced service provider (ESP), International gateway or the whole world exist point (GPOP) or ip intelligent peripherals (IP). |
Carrying (B) channel | Carrying (B) channel is be used to transporting digital voice and digital data information. Isdn bearer channel is per second 64,000 bits, and it can transport PCM digitized speech or data. |
The callee | The callee is in the destination or terminal receives automatic network to send the caller who calls out. |
The calling party | The calling party places the caller who calls out from initiating terminal by the network of any type. |
Central office (CO) | CO is the facility that holds local EO. EOs often is called |
|
COs。
|
1 grade of switch | 1 grade of exchange, regional center (RC) are the top of local and long-distance exchange, or " last appeals to office " is to finish calling. |
3 grades of switches | 3 grades of exchanges are main center (PC); Network access tandem exchange (AT) has 3 class functions. |
4 grades of switches | If it is toll center (TC) or toll point (TP) that 4 grades of exchange operators exist; Network access tandem exchange (AT) has 4 class functions. |
5 grades of switches | 5 grades of exchanges are lowermost layer of terminal station (EO) or local and long-distance exchange, local central office. The most close terminal use of this switch. |
The LEC (CLEC) of competition | CLECs be can with the telco service provider of the local telephone network service of ILECs competition. Nterprise is that Century21 is example. CLEC can or cannot the IXC service. |
Contention access supplier (CAPS) | Example is Teligent and Winstar. |
CPE (CPE) | CPE refers to be positioned at the equipment in client house, and is used for being connected to telephone network, comprises ordinary telephone set, KTS, PBXs, video conferencing equipment and modem. |
Digitalized data (or numerical data) | The analogue data (namely comprising 0 and 1 sequence) that digitalized data refers to sample and becomes binary representation. The less impact that is subjected to noise and attenuation distortion of digitalized data is because its easier regeneration is to rebuild primary signal. |
Go out network termination office | Outlet EO is node or the destination EO that is directly connected to callee, end point, and callee's " ownership " exports EO. |
Outlet | Outlet refers to from the connection to service circuit center (SWC) of the callee of network destination end or terminal. |
Terminal station (EO) | EO is for the 5 class switches that are used for the conversion exchange call in the LATA. The user of LEC connects (" ownership ") to EOs, table |
| Show that EOs is last switch that the user connects. |
Enhancement service provider (ESP) | Network service provider. |
Equal access | The 1+ dialing is used for the US domestic call, is used for accessing as required any long-haul carrier, and the improvement that requires to operate company (RBOCs) from the regional Bel that the AT﹠T of parent company separates is finally judged under (MFJ) term. |
The whole world on-the-spot point (GPOP) | GPOP refers to international telecommunication equipment and domestic equipment interface position, and the world goes out Incoming POP. |
The LEC (ILEC) that is employed | ILECs is the traditional LECs of the U.S., and it is that regional Bel operates company (RBOCs). Bell South and US West are examples. ILEC can also represent independently LEC, for example GTE. |
The entrance terminal station | Entrance EO is node or service circuit center (SVC) that is directly connected to callee, starting point, callee " ownership " entrance " EO. |
Entrance | Entrance refers to from calling party or initial connection. |
Integrated Service Digital Network(ISDN) (ISDN) basic rate interface (BRI) circuit | Isdn primary rate interface (BIR) circuit provides 2 carrying B channels and 1 data D circuit (usually said pass through one or two pair " 2B+D ") to the user. |
Integrated Service Digital Network(ISDN) (ISDN) | ISDN is the network that standard is provided for the amount of bandwidth of communication (speech, data and signaling), end-to-end Digital Transmission circuit, out-of-band signalling and characteristic remarkable. |
Middle machine relaying (IMT) | Middle machine relaying (IMT) is the circuit between the switch of two public connections. |
Inter-exchange carrier wave (IXC) | IXCs is U.S. domestic telecommunication service provider. AT﹠T, MCI, Sprint are examples. |
Internet protocol (IP) | IP is the part of ICP/IP protocol. It is used for identifying the information of input, for outgoing message is selected route, followed the tracks of the internet node address (with the TCP/IP master on the numeral appointment internet |
| Machine). IP is corresponding to the Internet of OSI. |
ISP (ISP) | ISP is the company that internet access is provided for the user. |
Isdn primary rate interface (PRI) | Isdn primary rate interface (PRI) circuit provides coordinate for ISDN provides the T1 circuit. The PRI that is delivered to the client house can provide 23B+D (North America) or 30B+D (Europe) channel that moves with 1.544 megabits per seconds and 2.048 megabits per seconds respectively. |
Local switch carrier wave (LEC) | LECs is local telecommunications services provider. Bell Atlantic and US West are examples. |
Local access and transmission district (LATA) | LATA is the area that LEC provides service. Inner these local geographical areas of the U.S. have 160 LATAs of surpassing. |
LAN (LAN) | LAN be under standardization control the computer by relatively short distance (for example, interior of building) and ancillary equipment (for example, printer is connected with modem provides the communication network of connection. |
Improved final judgement (MFJ) | Improved final judgement (MFJ) is that the regional Bel of requirement operates company (RBOCs) from the decision of their AT﹠T of parent company disengaging. |
Network node | Network node is the generic term of resource in the telecommunicatio network, comprises switch, DACS, regenerator etc. Network node comprises all inverter circuits (transmission) equipment in essence. Other network node can comprise for example CLEC device, or other enhanced service provider (ESP), exists point (POP), the world to go out Incoming or there is point (GPOP) in the whole world. |
Newcomer (NE) | A new generation's global communication. |
Phone (NGT) of future generation | New telco service provider, particularly IP phone provider. Example is layer 3 and Qwest. |
Packetized voice or the speech by backbone network | An example of packetized voice is the speech (VOIP) by Internet protocol. Speech by grouping refers to transport phone or voice service by data network, and for example speech passes through |
| Frame, speech pass through backbone network etc. by Internet protocol (IP), speech by Virtual Private Network (VPNs), speech by ATM, speech. |
Pipeline or private communication facility | Pipeline or private communication facility are connected to the internet with ISP. |
There is point (POP) | POP refers to the interior position of LATA of IXC and LEC equipment access. |
PPTP (PPTP) | Virtual private fidonetFido, PPTP (PPTP) are used in and set up " tunnel " between long-distance user and the data network. The tunnel allows the network manager that Virtual Private Network (VPN) is expanded to data network (for example internet) from server (for example Windows nt server). |
Point-to-point (PPP) agreement | PPP is the agreement that allows computer and internet to utilize modem to connect. PPP supports high-quality figure front end, similar Netscape. |
Postal telephone telegram (PTT) | The telephone operator of national management, many management, for example NTT of just removing. |
PBX (PBX) | PBX is the private branch exchange system that is positioned at user's defence. The user generally is the private company that the crack net provides local exchange. |
Special line with dialing tone | Special line is specifically to be exclusively used in the direct channels that the client uses between two concrete points. Special line with dialing tone can be connected to the access connector of PBX or ISP end office (EO) (for example, the T1 of channelizing or PRI). Special line can also be called leased line. |
Public switch telephone network (PSTN) | PSTN is global voice switching net |
Regional Bel operates company (RBOCs) | RBOCs provides the Bel of LEC service to operate company after AT﹠T breaks away from. |
Signaling system 7 (SS7) | SS7 is a kind of common channel interoffice signalling (CCIS) that is widely used in all over the world. The SS7 network provides signaling capability, and Route Selection and destination signal are called out and arrived, transmit in expression |
| With monitoring wire and circuit state. |
Exchange class or office class | Office class be according to transmission requirement and with the multilevel relation of other switching centre function rank to the telephone central office switch. Before RBOCs broke away from AT﹠T, office class was the numeral of distributing to office according to the multistage function in American public switching network (PSTN). Grade numeral below using: 1 grade=zone center (RC), 2 grades=regional center (RC) (SC), 3 grades=main center (PC), 4 grades=toll center (TC), if the operator exists or other toll point (TP), 5 grades=end office (EO) (EO) local central offices. Any one center processing is from a lower service to two or more centers of hierarchy. Have more intelligence software because deprive with exchange, these appointments have become so infirm. 5 grades of the most close terminal uses of switch. Technology has been disperseed the traditional definition of network hierarchy and switch grade more near the terminal use. |
The telecommunications carrier wave | LEC, CLEC, IXC, enhanced service provider (ESP), ip intelligent peripherals (IP), the world/whole world exist point (GPOP), i.e. any telco service provider. |
Transmission control protocol (TCP) | TCP is end-to-end protocol, in the transmission of OSI and session layer operation, through separating and ordering IP is grouped between the process of master computer operation and transmits data byte. |
Transmission control protocol/Internet protocol (TCP/IP) | TCP/IP is the agreement that communication is provided between interference networks. ICP/IP protocol is widely used in the internet, and it is the network that comprises by the many catenets that connect at a high speed. |
Junction line | Junction line connects network access tandem exchange (AT) and end office (EO) (EO). |
Wide area network (WAN) | WAN is the data network that LAN is expanded to the telecommunications carrier circuit. This carrier wave generally is general carrier wave. Bridge joint switch or router are used for connecting LAN and WAN. |
Ix. foreword
Service quality in the wireless environment (QOS)
The concept of service quality (QoS) is the most difficult and least intelligible theme in the data network. Although public term is arranged in data network, QoS has many different purposes and definition, and this can cause the conflict with accurate or quantitative term. When attempt to measure or specify when being enough to allow to carry out equipment or network performance about relatively numerical value of QoS, can further find collision.
When being applied to RFDC, be passed and amplify in the common collision about QoS of data network. Wireless transmission has the intrinsic bit error rate (BER) higher than wire transmission. Increase the topological structure of for example point-to-multipoint (PtMP) so that wish QoS is defined as a plurality of complexity factors in the special solution RFDC for a plurality of users that share wireless medium.
For the clear definition of the QoS that is applicable to RFDC is provided, the problem character that QoS will solve is useful. Many problems of carrying out data communication by wireless mode are exclusive and are different from wired data communication, but in fact have some problems to have. For wireless broadband access system, the quality problems of transmission are more complicated than wired analog form. Be similar to wired homologue, the problem that wireless transmission data run into for example comprises at a slow speed peripheral hardware access, data error, " spill-over ", unnecessary repeating transmission, congested, the out-of-sequence packet of service, delay and jitter. Except these problems, wireless transmission has increased problem, and these problems for example comprise the higher intrinsic bit error rate (BERs), finite bandwidth, user's contention, radio interference and the management of TCP service speed. The wireless system expectation of paying attention to QOS solves these all problems.
The user of data network has various ways experience difficulty. A kind of network difficulty is owing to lack network availability. According to employed access technology, this can comprise " modem is not replied " situation, " network busy " situation or network connection unexpected " going offline ". These situations can not be described as consistent with high QoS. In case the realization network connection and since the congested slow communication service that causes, local access bottleneck and network failure can show as webpage load slow, file transfers is slow or stream multimedia use in voice/video of poor quality. Meeting of poor quality during stream multimedia is used causes height " shake ", or large and rapidly delay variation, causes interruption, distortion or the termination of session. Many different situations can cause actual data error, and it may be catastrophic under some environment, for example in the document transmission process of electrical form. Expectation can minimize or eliminate these problems of data communication network.
1. quality
In data network, quality means usually with the reliable and timely mode processing that transmits data. Reliably and in time be the character that depends on the communication service that will solve. These terms can comprise that restricting data is lost, expected data accuracy, restricting data delay variation (being also referred to as shake) and restricting data are retransmitted and the inverted reference of restricting data order of packets. Therefore, QoS is the concept of a complexity, and it needs the mechanism of very complex to realize.
QoS can be a kind of relative term, has different implications for different users. Browse network the but casual user of download file transportation protocol (FTP) file or real time multimedia sessions does not download with the ftp file that carries out many large databases or financial sffairs paper, H.323 the user that calls out of video conference and IP phone has different definition to QoS frequently occasionally. And the user can be high network availability, the low delay and low jitter payment extra charge (being so-called service-level agreements (SLA)), and another user can be for occasionally surfing on the net or only in the low expense of payment at weekend. Therefore, perhaps preferably QoS is interpreted as continuity, by what network performance characteristic to specific user and the most important definition of customer sla. Maximization terminal use's experience provides the necessary component of wireless QoS.
2. service
In data network, service can be defined as a kind of connection from the network end to end. In the past, service can be further defined as concrete agreement, for example the IPX of the system network architecture of IBM (SNA), Novell, the DECnet of Digital. But seemingly TCP/IP (namely comprising UDP (UDP)) has proceeded to the overwhelming agreement that becomes selection, and will continue to become inundatory in predictable future. Therefore, service can be defined as TCP/IP connection or the transmission of specific type. This COS can comprise for example ftp file transmission, E-mail service, hypertext transfer agreement (HTTP) service, H.323 video conferencing session. Expect that a kind of QoS mechanism processes these dissimilar services, except processing previously discussed dissimilar quality.
3. as a kind of QoS of mechanism
QoS can think a kind of mechanism, is used for the network service that network, transmission and communication resource distribution that the distribution of choice lacks have the difference type of suitable priority. Ideally, the characteristic of the character of data communication services amount, customer requirements, network scenario and information source and the stay of two nights can change the QoS mechanism in any given time operation. But last, desired QoS mechanism thinks that the user provides the mode of optimal service to operate, and defines in which way irrelevant with the user.
A. Circuit-switched QoS
Telephone operator is mainly leaving in the network of voice service generation, and transfer of data realizes with reference to the definition centered by circuit of QoS. In this definition, QoS refer to transport asynchronous (i.e. beginning by sequence needn't utilize public clock transfer data with being connected) and etc. the time (for the access network bandwidth that the speech of time sensitivity is connected with video) service the Circuit-switched QoS of ability by connecting or service contribution end to end circuit is realized for each, no matter it is speech (referring to Figure 1A) or data. QoS mechanism centered by circuit only provides this circuit so that the user monopolizes use. Certainly, the method whole duration of session all for unique user provides circuit, whole transmission channels and the transmission medium self relevant with this circuit, and whether the actual transmissions data are irrelevant constantly with each of session. People believe to only have this mode can really realize QoS usually. Whether therefore, wireless broadband access system (referring to Fig. 2 A) traditional design is also utilized the method, provide wireless channel for each specific data connects, and really have the data transmission irrelevant with application or at any given time. The scheme centered by circuit of this QoS is quite expensive with regard to the utilization rate of the cost of equipment and transmission medium self.
B. asynchronous transfer mode (ATM) QoS
For the ATM net, telephone operator can be continuous the speech circuit mechanism for leaving over the mechanism of the QoS centered by circuit is provided, this QoS mechanism has the permanent virtual link (PVCs) (virtual path or virtual channel that being unlimited utilization provides connect (VPC or VCC)) set up with analog form and exchange virtual link (SVCs) (be the ATM net according to receive from terminal use or another network signaling information needs set up the logic connection between the end points). But, need a plurality of new ideas, comprise the mechanism that allows strategy, service shaping and for example leaky bucket, in order to process the service that is categorized as now variable bit rate (VBR), constant bit rate (CBR) and unspecified bit rate (UBR).
Virtual circuit is set up for data transmission conversation, again whether transmits data independence with market demand or at any given time. Although ATM is provided for the QoS of broadband networks service, the basis hypothesis of ATM design includes the low BER characteristic of gauze rather than the high BER of wireless medium. Service characteristic and wireless higher intrinsic BER that nonrecognition ATM reason is transported just can not provide actual QoS. ATMQoS mechanism does not solve the unique challenges relevant with radio communication.
C. the QoS of packet switch
Packet switch is to have revolutionary data communication, and therefore traditional circuit switching and ATM net concept and their the QoS mechanism of leaving over need to upgrade. For packet-switched data communication, it provides circuit can not for specific data communication session. In fact, the packet switch strength is the flexibility of Route Selection and the concurrency of its respective physical network. Therefore, QoS mechanism can't be worked in the mode identical with the QoS mechanism centered by circuit of leaving over.
It is not the enough QoS mechanism for the packet switching network that " suitable " bandwidth is provided simply, rather than is used for wireless broadband access system. Although some IP stream is " sensitive to bandwidth ", and other IP stream is to postponing and/or the shake sensitivity. In real time or media stream and application can not be by too much timely behavior of Bandwidth guaranteed be provided simply, even be not the problem of cost. Expect to identify requirements different between detailed service IP stream and the IP stream for the QoS mechanism of the wireless broadband access system centered by IP, and distribute these IP of transmission to flow essential system and media resource in the mode of the best.
D. summary-QoS mechanism
At last, terminal use's experience is the final judgement person of QoS. The wireless broadband access system of expectation centered by IP distributes and regulating system and media resource in the mode that can maximize end-user experience. For for example application of initial page download screen, data transmission bauds is the best measured value of QoS. For other application, for example download or upload electrical form, the minimizing of the transmitting measured values error that QoS is best. Use for some, the best measured value of QoS can be to optimize speed and error. Use for some, transmitting grouping timely can be the best measured value of QoS. The important rapid data transmission that it should be noted that is not identical with the timely transmission of grouping. For example, " too old " packet can promptly be transmitted, but also can be experienced useless to the user. Then the end-user experience of the character of market demand self and expectation can provide the most reliable standard for QoS mechanism. The wireless broadband access system of expectation centered by IP provides QoS mechanism, and this QoS mechanism can be the system performance of each specific IP stream, can also adapt to the change of network load, congested and error rate and changes.
4. service guarantees and service-level agreements (SLAs)
Service guarantees can be carried out, and service-level agreements (SLA) can enter between telco service provider and the user, thereby can describe the network availability of given extent, and interview expenses can be based on the degree of this appointment. Regrettably, be difficult to quantize the degree at any given time network availability, so it becomes quite coarse the measuring of service performance. Expected data transfer rate, error rate, repeating transmission, delay and jitter are measured as network availability, but are measured in real time the ability that these amounts have exceeded legacy network service provider (NSP).
Another layer service difference of Internet Service Provider's expectation is service-level agreements (SLA), and this agreement provides different service speed, network availability, bandwidth, error rate, stand-by period and shakes to guarantee. The wireless broadband access system of expectation centered by IP can provide SLAs, makes the service provider can have more chance and is used for service differentiation and income.
5. the grade of service and service quality
In order to realize actual QoS mechanism, expect that a kind of system can distinguish communication service or COS, so the different layers of system resource can be distributed to these types. The device that traditionally " grade of service " is called the marshalling COS that can receive similar processing or distribution system and media resource.
At present, there are a plurality of methods can be used to the wired network device and realize the differentiated services grade. Method as an example comprises service shaping, permission control, IP is preferential and the difference congestion management. Thereby the wireless broadband access system of expectation centered by IP utilizes these all methods service differentiation to be mapped to operation and the management of QoS matrix simplification QoS mechanism as the grade of service, with these grades of service.
B.QoS and the wireless environment centered by IP
In similar point-to-multipoint (PtMP) of the present invention wireless system, desired QoS mechanism is not only dealt with the consideration of wired network, but also deals with the consideration specific to wireless environment. Such as noted above, wireless intrinsic BER is processed in expectation. High BER can require with effective mode error detection, correction and repeating transmission. Expectation BER processes mechanism and also utilizes the repeating transmission algorithm of TCP/IP effectively to work, and can further not cause the deterioration that bandwidth usage is unnecessary. Another wireless challenge is the limited wireless bandwidth of contention among the user. Expect that this system processes the service request from a plurality of users in the wireless medium that is vulnerable to disturb with noise, this is so that be difficult to effectively carry out effective distribution of wireless bandwidth.
As mentioned above, from circuit switching and ATM data network change to the packet-switched data net compressed the definition of QOS mechanism. The present invention provides a kind of new QOS mechanism to be used for the communication service of the packet switching network in the point-to-multipoint wireless system centered by IP. In order to make this system that best QoS performance is provided, expect that this system comprises new departure of QoS mechanism. QoS instructed as the basis of system architecture and design consisted of the wireless broadband access system centered by IP of the present invention and design and have important, essential and favourable difference between the existing wireless broadband access system that tradition for example Teligent centered by circuit or the scheme of ATM cell centered by circuit and Winstar use.
C. the WiMAX centered by IP accesses QoS and queue discipline
1. managing queueing
Queuing is the required usually received instrument of manipulation of data stream. For the packet header that will check or change, route is judged or at suitable port output stream, the expected data grouping can be lined up for carrying out. But, introduce time-delay according to definition queuing to service flow, this is harmful to, and even can eliminate the purpose of queuing fully. Excessive queuing meeting has injurious effects to communication service, because the packetization delay to the time sensitivity can be exceeded their useful time frames, or increase RTT (round trip cycle), produce unacceptable shake even cause the overtime of data transport mechanisms. Therefore, expectation can utilize queuing clever and thriftily, and needn't to delaying time sensitive communication service, for example introduce unsuitable time-delay in the real-time session.
Under wireless environment, time division multiple acess (TDMA), forward direction error detection (FEC) and another kind of technology are essential, and the expectation queuing only is used for allowing grouping and radio frames to process. But in the situation of Real-Time IP stream, the time-delay that all increases in real-time communication service preferably remains on roughly below 20 milliseconds.
Direct method with queuing management for the simple of wireless broadband system as main QoS mechanism based on the differentiated services of QoS is provided. But wireless system is subject to more limit bandwidth than the wired system of correspondence usually, and is therefore sensitiveer to time-delay. For this reason, expectation can provide based on the differentiated services of QOS and exceed the mechanism that simple queuing can be accomplished. But some queuing remains essential, and what discuss now is different queuing strategys.
2. first in first out (FIFO) queuing
First in first out (FIFO) queuing can be used to wireless system, is similar to wired system, buffered data grouping when downstream data channel becomes temporary congestion. If temporary congestion is caused that by the burst communication service fifo queue of reasonable depth can be used for smoothly entering the data flow of congested communication section. But if congestedly become very serious, or the duration is relatively long, and capacity is inserted in the grouping that FIFO can cause deleting in the FIFO formation, and network can not accept to cause the additional packet of grouping deletion, i.e. so-called " grouping is waved ". Although this has injurious effects to QOS and himself, the deletion meeting in group causes further problem to flow of services, because Transmission Control Protocol can with the grouping of correct order retransmits lost, further worsen this problem. The discarded problem of grouping can minimize by the size that increases fifo buffer, but can therefore need the more time before discarded the appearance. Regrettably, final FIFO can become and enough make greatly grouping become too old, and can be increased to the useless degree of grouping two-way time (RTT), and it in fact is to have lost that data connect.
In the WiMAX environment, the type that requires the employed RF cut-in method of partial dependency of fifo queue. For TDMA/TDD (TDMA/TDD), the expectation data queued namely is used in collects the Frame that enough data configurations are used for transmission. Frequency division multiple access (FDMA) and CDMA (CDMA) are not " TDMA " in essence " orders ", and therefore queuing has lower requirement to FIFO. But usually for all radio access technologies, Noise and Interference is to cause the factor retransmitted, therefore QoS is produced further time-delay and thing followed reaction.
Utilize fifo queue, all services of can delaying time equably of shared wireless broadband system. This looks it is " the most fair " method, if but target is to provide high QoS then the best way not necessarily for the user. Utilize dissimilar queuing managements, can realize better basis of whole QoS.
3. priority queue
The WiMAX environment of sharing can comprise that data are able to the finite bandwidth fragment by the RF media transmission. Therefore, irrelevant with access technology, these systems may need some queuing amounts. But, utilize fifo queue can cause to all services constant postponement, and do not consider service priority or type. Most of data communications environments comprise the service of mixing, have that real-time, interactive data, file and data are downloaded, the service of some types of combination of web page access etc. is sensitiveer than other types to time-delay and shake. Therefore priority queue can move on to the front of formation simply according to the relative priority of packet and the packet in the type rearrangement formation to the service data of stand-by period and shake sensitivity.
Regrettably, congested if down-link data channel is congested or higher priority service too much causes, " buffer is hungry " situation then can appear. Because the relative capacity of high priority packet has taken most of buffer space, only stay less space for lower priority packet. The significant time-delay of meeting in group experience of these low priorities is because system resource offers high priority packet. In buffer, preserve for a long time a period of time or never reached buffer except low-priority packet, caused the data flow of these groupings obviously to postpone, can also be destroyed and quit work corresponding to the practical application of these low-priority packet. Because the character of sort method, the whole stand-by period, shake and the RTT that are used for low-priority packet are difficult to expect that this has reaction to QoS.
If queue length is little, the rearrangement of data has wholesome effect to QOS in the formation. In fact, check packet header in order to obtain the postponement that the necessary required processing of information rearrangement formation itself will significantly increase data flow. Therefore, particularly for the broadband wireless data environment, as QoS mechanism, priority queue can be well more not a lot of than fifo queue.
4. based on the queuing of grade
By giving grouping with system resource between the grade distribution queue empty according to grouping, just can avoid buffer hungry. Each grade can be defined as the data flow that comprises with some similar priority and type. All grades can provide the lowermost layer of service, so high-priority traffic can't be monopolized all system resource. According to this classification schemes, because there is not data flow forever to be fully closed, information source is used the information that can receive about service speed, and the transfer rate that can provide TCP to adjust, and supports uniform service flow.
Although this scheme can be done better than the FIFO queuing in wireless broadband system, stand-by period and the sensitive IP of shake fail to be convened for lack of a quorum and are subject to the adverse effect of the large capacity IP stream of high priority.
5. Weighted Fair Queuing
The Weighted Fair Queuing method can be attempted the queuing resource of giving security for IP stream in a small amount, therefore can allow remaining IP to flow the resource that capacity no matter or priority have equivalent. Although this can prevent that buffer is hungry, can cause better delay and jitter performance, is difficult to the performance that reaches stable in the face of vertiginous RF downlink channel bandwidth availability.
Provide high-quality service to need the more complicated QoS mechanism of the simple queuing management of a kind of ratio.
D. the WiMAX centered by IP accesses QoS and TCP/IP
1.TCP/IP
The ICP/IP protocol stack has become the standard method that transmits data by the internet, and becomes just gradually the standard of Virtual Private Network (VPN). The ICP/IP protocol stack does not include only Internet protocol (IP), also comprises transmission control protocol (TCP), UDP (UDP) and ICMP (ICMP). Suppose that the ICP/IP protocol stack is the computer network with standard network protocol for data communication, the QoS mechanism that creates one group of the best is used for more manageability of broadband wireless data environment. QoS mechanism may create can spanning network gamut, comprise the wired and wireless portion of network. The end-to-end QOS mechanism of the wired and wireless portion of network can be provided with the integrated TCP speed of level and smooth and transparent mode control mechanism and providing these mechanism. Certainly, congested or experience other wired network part that transmits problem can't be with wireless QoS mechanism solution. But when not having the congested or bottleneck of serious cable network to exist, wireless QOS mechanism can be to strengthen the mode optimized data stream of end-user experience.
2. use grade distinguishing
As mentioned above, data communication services can be processed according to the grade of service. In order to use the grade distinguishing service, data communication services (or sequence packet relevant with specific application, function or purpose) can be divided into of a plurality of grades of service. Differentiation is to make according to some information that can identify that are included in packet header. A kind of method can comprise a plurality of that analyze in the IP packet header for example, and they can uniquely identification and related this grouping and other grouping from the stream of packets with specific application, function or purpose. At least, information source IP address, information source TCP or udp port, IP address, destination and destination IP or udp port can make grouping related with public IP stream, namely can be used for packet classification to the grade of service.
By creating the discrete grade of service of finite sum manageability number, a plurality of IP streams can be processed by the merging of QoS mechanism with one group of given qos parameter. These grades can be defined in made up provide public and useful in the wired and wireless network fragment characteristic for best management.
3. the differentiation of each IP stream
One group of discrete grade of service of finite sum can allow QOS mechanism amount of calculation so unconcentrated, uses less internal memory, less state machine, and therefore having independent QoS mechanism (or several groups of parameters) than each independent IP stream has better scale. But, at network access device, for example in point-to-multipoint (PtMP) wireless broadband access system, IP stream sum simultaneously is general can not to surpass 1000 scope, therefore desired processing expenditure amount can allow the QoS of each IP stream to distinguish, and does not state all in the grade of service. But the grade of service of IP stream merges the advantage that is provided in the marketing, paying and management.
Before the present invention, each IP stream is distinguished and is not used for wireless environment (comprising the radio frequency transmission by coaxial cable and satellite communication).
4. IP preferentially is used for the grade of service
As described with Internet Engineering work group (IETF) 1992b, the preferential bit of IP in COS (IPTOS) field in theory can be as the device that IP stream is ordered into the grade of service. One group of 4 bit definitions of IETF RFC 1349 suggestions have different implications: minimal time delay; Maximum throughput; Maximum reliability; Minimum monetary cost; With normal service.
These definition can add in network, Route Selection and the access device significantly, are used for distinguishing dissimilar IP stream, and therefore Resources allocation suitably causes QoS to improve. But this suggestion is not widely used. Many suggestions among the IETF utilize this field and RSVP (RSVP), to improve the network processes of grouping.
Although COS (TOS) field has become the indispensable part of TCP standard for many years, this field is not used usually. Suitable bit absent in this field arranges by the message source process machine, and access device, network and network route can't realize QoS mechanism.
5.TCP adjust transfer rate mechanism
TCP adjusts the mode of transfer rate and can incorporate into and manage by the wireless QoS mechanism centered by IP. If do not manage TCP mechanism, any wireless QoS mechanism can be overwhelmed or offset by the wireless bandwidth coefficient. Before solution affects the concrete wireless factor of TCP transmission speed, need to look back TCP transfer rate mechanism.
When packet loss occurred, TCP can be by " induction " control transfer rate. Because TCP/IP is mainly cable environment and creates, have low-down intrinsic BER, such as what find by fibre circuit, any packet loss of supposing TCP all is owing to network congestion, rather than loses by error code. Therefore, TCP supposition transfer rate surpasses the capacity of network, and responds by the transfer rate that slows down. But radio chains highway section packet loss mainly is because intrinsic high BER is not congested. The difference that shows also is significant. TCP can be at first stream of packets begin transfer rate is evenly risen, be known as the mode that begins slowly. This speed can increase continuously, until grouping confirmation of receipt information dropout or overtime. TCP is " compensation " therefore, reduces the transmission window size, then with the grouping of slower speed and correct order retransmits lost. Therefore TCP can increase transfer rate with linear mode, and this can be called the mode of avoid congestion.
If share Radio Link as a plurality of users of the present invention, the intrinsic high BER of medium causes frequently packet loss, causes issueless TCP repeating transmission in the Congestion Avoidance mode. Because wireless bandwidth is a kind of article of preciousness, the wireless QoS mechanism centered by IP preferably provides packet retransmission and does not enable TCP and retransmit and unnecessary " the ending in defeat for both sidesboth suffer losses " of thing followed transfer rate. This factor and many other factors can create wireless medium access control (MAC) layer centered by IP. A function of the MAC layer centered by IP is to adjust this locality repeating transmission of lost packets and needn't send TCP and unnecessarily change the TCP transmission speed. The main task of the wireless MAC layer centered by IP is the shared access that is provided to wireless medium with order and effective mode. According to MAC layer of the present invention, media accesses (PRIMMA) layer of the emphasis intelligent multimedia of reserving based on trying to be the first, from CA, the Malibu network company of Calabasas can also consider all transmitted in packets of the whole wireless medium of scheduling according to for example IP traffic category, service-level agreements (SLAs) and QoS.
6. the TCP Congestion Avoidance in the wireless system centered by IP
A. network congestion collapse, global synchronization and the wireless tcp Congestion Avoidance centered by IP
The intrinsic high bit-error (BER) of wireless transmission so that occur usually said congested collapse or the collapse likelihood ratio cable environment of problem of global synchronization large. When a plurality of TCP transmitters simultaneously because packet loss detecting to congested, the TCP transmitter all can enter the slow Starting mode of TCP by transmission window size and temporary transient time-out that shrinks them. Then a plurality of transmitters are all attempted the grouping of retransmits lost simultaneously. Because they are all with roughly synchronous again startup transmission, thus can occur producing congested possibility, and circulation can restart.
At wireless environment, the appearance of burst noise can cause from many IP traffics while lost packets. The TCP transfer rate mechanism of TCP transmitter can be supposed grouping owing to congestion loss, and they all can compensate synchronously. When the TCP transmitter restarted, what transmitter was can be roughly synchronous restarted, and in fact can produce now actual congested in the radio chains highway section. This cycle behavior meeting continues a period of time, may cause the systematic function that is difficult to expect. This part can be because system queue overflow, and it can cause that more grouping drops and can cause more repeating transmission in rain. This can degenerate and enter " race " condition, and this can spend before rebuliding stability many minutes; This can produce obvious negatively influencing to QoS.
At wired world, detect in advance at random (RED) and can be used for preventing global synchronization. By before the congested appearance of collapsing, selecting at random can avoid global synchronization from the grouping of selecting at random stream of packets. Formation can be monitored, when when queue depth surpasses the boundary that presets, RED can be started, the transfer rate controller of asynchronous starting TCP transmitter. This can be avoided initial congested, and this congested meeting causes collapsing, so global synchronization.
Replace pure random packet discarded, consider that packet-priority or type can discard this parcel. Although remain at random, the probability of deleting given IP stream can be the function of packet-priority or type. In wireless system, the Real-Time IP stream by preference such as data stream audio and the UDP grouping with harsher grouping life span Parameter H .323 stream adopt Weighted random to detect in advance (WRED), and needn't consider to retransmit and TCP speed resets. These IP streams are sensitiveer to stand-by period and shake, and are more insensitive to packet loss.
In wireless environment, utilize the suitably MAC layer of design, may trigger congested collapse and packet loss that the BER of global synchronization causes according to the present invention the most handy local retransmits lost divide into groups to manage, do not need resetting of the unnecessary packet retransmission of RED and TCP transmitter and TCP transfer rate. The TCP transmission window of the telemanagement TCP transmitter that the wireless system centered by IP is independent, the TCP transmitter detect that packet loss and beginning is retransmitted and the unnecessary transfer rate that resets before transmit the grouping confirmation of receipt. This wireless system TCP transmission window manager centered by IP is communicated by letter with the MAC layer, to learn the state of all groupings that transmit by wireless medium.
B. the impact of fractal Self-similar Network service characteristic and Poisson distribution in the network congestion
Routinely, believe that network service can simulate with Poisson distribution. Utilize this distribution to obtain a kind of like this conclusion by system simulation, namely thousands of summations with service flow of Poisson distribution cause the even distribution of whole network service. In other words, the burst that whole network can " equalization " single service flow. Utilize this model, network congestion behavior, burst behavior and dynamic service characteristic are for generation of traditional congestion avoidance policy, planned network device queue buffer size and service and the prediction of capacity limitation.
Nearest studies show that service based on TCP/IP is so that network shows as fractal or the self similarity mode. According to this model, when the burst of single service flow amounted to whole network, whole network can become burst. All time ranges of the burst characteristic overlay network of network service stream and IP stream scope. This lies in the design consideration wireless broadband system centered by IP of the present invention, and as the congestion avoidance policy in the global design network. Utilization is to the New Observer of network characteristic, and clearly network router, switch and transmission equipment in most of the cases are " without the engineers ". This further deterioration that causes the network congestion behavior without the engineer.
Wireless system general structure centered by IP and the implicit scope of design are to the local congestion avoidance strategy from the buffer queue capacity. Because wireless system is larger to the burden of the intrinsic BER of height, netting wide congested behavior must correct measurement and counteracting on the impact of local (wireless medium channel) congestion avoidance policy. For this reason, the congestion avoidance algorithm of the wireless system of expectation centered by IP is designed to consider to come Optimized Service stream with new mathematics and engineering, and this mathematics and engineering are considered until recently just not obvious or unavailable to the system people.
Consider these, the wireless system design centered by IP can't be processed traditional wired system design and can not cause the Performance Characteristics of system very low. According to the traditional design scheme of the wireless system centered by circuit, the QoS of bandwidth usage, real-time multimedia quality and whole system provides low-down end-user experience.
7. the concrete application message current control in the wireless system centered by IP
In stream coverage, each data flow has different bandwidth, stand-by period and shake requirement, for the high QoS that realizes that the terminal use can feel, and can be in the wide region real-time management QoS mechanism parameter of the wireless system of expectation centered by IP. QoS mechanism must can change system performance, as long as open and close in transparent mode from suitable terminal use's the one or more data flow corresponding to concrete application. This scheme and the difference of other QoS mechanism be being connected centered by circuit to realize high QoS end to end by setting up, and needn't consider the base application that actual QoS requires. Utilize the present invention, provide specifically in using rather than specifically in the QoS of circuit mechanism, the wireless bandwidth of shortage can be saved and dynamic assignment to the place of QoS mechanism that need to be relevant with each action type.
B.QOS and centered by the wireless medium access control
1. based on medium access (PRMIMA) the MAC layer of the emphasis intelligent multimedia of leading reservation
Medium access (PRIMMA) media access control (MAC) layer of the emphasis intelligent multimedia based on leading reservation of the present invention provides the applications exchange function of the wireless QoS mechanism centered by IP. In case the character of each IP traffic and qos requirement are determined that by the other parts of this system this information is sent to the PRIMMAMAC layer, so the IP of each application stream is transformed into suitable destination with correct order of priority.
2.PRIMMAIP the vertical signaling of protocol stack
For the IP traffic that the CPE from the local user produces, can be by system for distributing suitable QoS mechanism parameter to IP traffic about the application-level information of application feature. For the IP traffic that produces from non-local main frame, about taking out from packet header for the information of the IP traffic of constructing suitable QoS mechanism parameter. Information about IP traffic " vertically " is sent to the protocol stack model from application layer (that is, OSI is the 7th layer) to the PRIMMAMAC layer (that is, OSI is the 2nd layer) that is used for RSVP and applications exchange purpose. Although this has run counter to every one deck for protocol stack isolation and conventional practice independently are provided, thereby how much limited the interchange level of each layer of protocol stack, this advantage in the wireless broadband access system centered by IP is far longer than shortcoming.
3.PRIMMAIP control and the applications exchange of stream
Use the one group of concrete qos requirement that flows according to each IP in the wireless system centered by IP, change in the mode of " in advance " by the bandwidth of wireless medium by suitable reservation. The frame for wireless transmission of each direction is constructed to the mode that each IP stream provides independent qos requirement. Utilize QoS to require structure frame for wireless transmission, the whole range of application that best QoS performance can cause system to process. For example, the IP phone of delay and jitter sensitivity, other the IP traffic and real-time audio and the video data stream that meet H.323 can provide for the optimal layout in the frame for wireless transmission higher priority. On the other hand, HTTP (HTTP) service, for example initial webpage transmission can provide higher RSVP priority for specific application task. Not other service of needed wait time, shake or bandwidth requirement, for example FTP (FTP) file is downloaded, mail transfer, can distributing system resource and frame for wireless transmission in the low priority that arranges.
4.PRIMMATCP transfer rate agency
Wireless terminal user separates with high speed, low BER wired backbone by the low speed that is vulnerable to the burst error event, high BER wireless portion. Traverse the TCP/IP service of wireless segment and experience frequently packet loss, this packet loss does not have aforesaid congested the collapsing and global synchronization of noisy generation. Therefore, expect that the wireless system utilization centered by IP of the present invention can monitor the TCP transfer rate of wireless segment packet loss, and can be by rebuilding and transmitting any packet acknowledgement of losing and manage long-range TCP transfer rate function. PRIMMAMAC layer oneself can be retransmitted any grouping of losing by wireless medium.
Wireless tcp transfer rate agency centered by IP or " annex " can also be controlled IP traffic according to the qos requirement of IP stream where necessary. All wireless tcp transfer rate agencies' centered by IP function can and be used transparent to local and remote main frame.
F. telecommunicatio network
1. speech net
A. simple speech net
Figure 1A provides the block diagram of standard telecommunicatio network 100 overviews, and this telecommunicatio network 100 provides local switch carrier wave (LEC) service in one or more local accesses and transmission region (LATAs). Telecommunicatio network 100 can provide from calling party 102 to the callee 110 voice switching to connect. Figure 1A represents also to comprise PBX 112, and this PBX 112 is provided to the multiple access of LEC service by for example special line. Calling party 102 and callee 110 can be common telephone plant, KTS, PBX (PBX) 112 or the application that moves at master computer. Network 100 can be used as the modem access, connects as the data from calling party 102 to for example ISP (ISP) (not shown). Network 100 also can be used for accessing for example private data network. For example, calling party 102 can be an office worker, and he is at this computer of remote location Operational Note, and for example connects his boss's of access private data network by dialing modem.
Figure 1A comprises terminal station (EOs) 104 and 108. EO104 is called into an innings EO, because it provides the connection of (PSTN) equipment from calling party 102 to public telephone switching network. EO108 is called out EO, because it provides from PSTN equipment to the calling party 110 connection. Except advancing innings EO104 and out EO108, be included in the network access tandem exchange (AT) that has point (POPs) 132 and 134 with the PSTN equipment of telecommunicatio network 100, it can be provided for the access of one or more IEC interexchange carriers (IxCs) 106 of long distance service, referring to Fig. 2 A. Perhaps, clearly IXC106 can also for example be CLEC, other enhanced service provider (ISP) for a person skilled in the art, the world goes out Incoming or the whole world exists point (OPOP) or ip intelligent peripherals (IP).
Figure 1A also comprises the PBX (PBX) 112 that is connected to EO104. PBX112 connects MPTY 124 and 126, fax 116, client computer 118 and relevant modem 130, has the LAN 128 of client computer 120 and the server computer 122 that is connected 130 connections of relevant modem. PBX112 is the instantiation that is positioned at a common class communication equipment of customer site, is commonly referred to CPE (CPE).
Network 100 also comprises for call setup and calls out the dismounting mutual signaling of common signal channel (CCIS) net. Specifically, Fig. 1 comprises signaling system 7 (SS7) signaling network 114. Signaling network 114 is described with reference to Fig. 2 B below.
B. detailed speech net
Fig. 2 A is the block diagram of description standard telecommunicatio network overview, and this telecommunicatio network provides LEC and IXC carrier service between the user in Different L ATAs. Telecommunicatio network 200 is telecommunicatio network 100 more detailed versions. Calling party 102a and calling party 110a are connected respectively to EO switch 104a and 108a. In other words, calling party 102a ownership is at innings EO104a that advances of a LATA, and callee 1lOa ownership is at the out EO108a of the 2nd LATA. Calling between the Different L ATAs user is the trunk call that generally is routed to IXCs. The example of American I XCs comprises AT﹠T, MCI and Sprint.
Telecommunicatio network 200 comprises network access tandem exchange (AT) 206 and 208. AT206 is provided to on-the-spot point (POPs) 132a, 132b, 132c and is connected connection with 132d. IXCs106a, 106b and 106c provide the connection between POPs132a, 132b and 132c (at a LATA) and POPs134a, 134b and the 134c (at the 2nd LATA). The selective connection that competition local switch carrier wave (CLEC) 214 provides between POP132d and the POP134d. POPs134a, 134b, 134c and 134d are connected to be connected to and are provided to the AT208 that outlet EO108a connects. Callee 1lOa can receive the calling from the EO108a under it.
Perhaps, for a person skilled in the art clearly, AT206 can also be CLEC or other enhanced service provider (ISP), the world go out Incoming or the whole world exists point () or ip intelligent peripherals.
Network 200 also comprises the callee 102c of ownership CLEC switch 104c. After the U.S.'s communication law in 1996, CLECs secures permission and competes the local RBOCs field that enters. RBOCs is called the on-the-job local switch with client computer 120b and the server computer 122b that is connected relevant modem 130b connection now.
I fixed wireless CLECs
Network 200 further comprises fixed wireless CLEC209. The example of fixed wireless CLEC is VA, communicate by letter with the Teleport BizTel unit of parent company of the Teligent company of Vienna, Winstar communication common carrier, advanced wireless telecommunications company. Fixed wireless CLEC comprises radio receiving-transmitting unit radio frequency (RF) tower 212 of communicating by letter with user's transceiver RF tower 212 by the RF link. User's transceiver RF tower 212 is described as and is connected to CPE box, PBX112b. PBX112b connects MPTY 124b and 126b, fax 116b, client computer 118b and relevant modem 130b, has the LAN 128b of client computer 120b and the server computer 122b that is connected relevant modem 130b connection.
Network 200 also comprises callee 110a, fax 116a, client computer 118a and relevant modem 130a, and with cellular communication RF tower 202 and relevant phone user calling party 204, they all connect EO108a, as shown in the figure.
EO104a, 108a and AT206, the 208th, the part of exchange hierarchy. EO104a is called 5 grades of offices, and AT208 is 3/4 grade of office's switch. Before the regional Bel business company (RBOCs) from AT﹠T was deprived of final judgement, office class was the office that distributes according to the multistage function of American public switching network (PSTN) number. Office class is according to the transmission requirement of telephone central office switch and other switching centre and the Performance Level of multilevel relation. Class 1 office is called zone center (RC), office top or " last appeal to office " finish calling. Secondary office is called regional center (RC) (SC). Three grades of offices are called main center (PC). If level Four office is called operator's existence then is toll center (TC) or toll point (TP). Pyatyi office is terminal station (EO), i.e. local central office is used for the lowermost layer of local and long-distance exchange and one deck of the most close terminal use. All process in this hierarchy from one or more services of hanging down centers at any one center. Have more intelligence software because deprive with exchange, these appointments have become so infirm. Technology has been developed more near terminal use's function, has disperseed the traditional definition of network hierarchy and switch grade.
Ii. the connectedness of ISP (ISP)
Except providing from calling party 102a to the callee 11 speech to connect, PSTN can provide the data connection of calling party 102a to ISP (namely being similar to client 118b).
Network 200 also comprises ISP (ISP) (not shown), and it can comprise the server computer 122 that is connected to data network 142, and it will further be discussed with reference to Figure 1B below. The internet is known global communication network, comprises a plurality of catenets that linked together by data link. These links can for example comprise integrated digital service network (1SDN), TI, T3, FDDI and sonet link. Perhaps, the internet can be for example interconnect a plurality of LANs of Intranet and/or the private network of WANs. ISP can provide Internet access service for for example user of client 118b.
In order to connect with ISP, client 118b can utilize master computer to be connected to modem (modulator/demodulator) 130b. Modem can become to be transferred to the Data Modulation of master computer the form (tradition is analog form) of LEC equipment. Generally, LEC equipment becomes digital form with the analog signal conversion of input. In one embodiment, data transaction becomes peer-peer protocol (PPP) form. PPP is the well-known protocol that allows computer to utilize standard modem and internet to connect. It supports high-quality graphical user interface. Those skilled in the art will recognize that, available other form for example comprises packet switch (IPX) protocol format and ICMP (ICMP) protocol format between transmission control procedure, Internet protocol (TCP/IP) packet format, UDP, Internet protocol (UDP/IP) packet format, asynchronous transfer mode (ATM) cell packet format, slip (SLIP) protocol format, point-to-point (PPP) protocol format, PPTP (PPTP) form, NETBIOS extended user interface (NETBEUI) protocol format, Appletalk protocol format, DECnet, BANYAN/VINES, net.
Iii. communication link
Notice that Figure 1A, 2A and other accompanying drawing described herein comprise circuit, these circuits can refer to that the logic between communication line or network node or the system connects, and these network nodes or system are realized by the communication carrier device physical. These carrier equipments comprise the network node between circuit and the circuit, for example comprise Digital Access and cross connect system (DACS), regenerator, tandem exchange, copper cash and fiber optic cables. Clearly these selectable communication lines can be used for connecting one or more communication system devices for a person skilled in the art. And the communication carrier of definition can comprise for example LEC, CLEC, IXC, enhanced service provider (ISP), have the whole world or international service provider and the ip intelligent peripherals of point (GPOP) such as the whole world here. EO104a is connected junction line with AT206 and connects. Junction line is connected to EO with AT. Machine junction line (IMT) in the middle of junction line can be called. It can be the junction line connection of IMT that AT208 is connected with EO108a.
Referring to Figure 1A, EO104 and PBX112 can be by having the private line access of dialing tone. Special line can also for example be connected to EO104 with the ISP (not shown). Special line with dialing tone can be connected to modem frame or access at the Changer Device of ISP. The example of special line is the basic rate interface (PRI) of T1 or the Integrated Service Digital Network(ISDN) (ISDN) of channelizing. ISP can also be connected to the internet by pipeline or private communication facility. Pipeline can be the private communication facility. Special line can be processed and from the data modem unit service of ISP.
Junction line can processing and exchanging voice service and data, services. For example, junction line can comprise the data signal DS1-DS4 by the T1-T4 carrier wave. Table 2 provides typical carrier and they data signal, channel number and bandwidth capacity separately.
Table 2
Data signal | Channel number | Carrier wave represents | Megabits per second bandwidth (Mbps) |
DS0
|
1
| Nothing |
0.064
|
DS1
|
24
|
T1
|
1.544
|
DS2
|
96
|
T2
|
6.312
|
DS3
|
672
|
T3
|
44.736
|
DS4
|
4032
|
T4
|
274.176
|
Perhaps, junction line can comprise light carrier (OCs), for example OC-1, OC-3 etc. Table 3 provides typical light carrier, and their synchronous driving signal (STSs), ITU name and bandwidth ability separately.
Table 3
Light carrier (OC) signal | The signal of telecommunication, or Synchronous Transport Signal (STS) | International Telecommunications Union (ITU) term | Megabits per second bandwidth (Mbps) |
OC-1
|
STS-1
| |
51.84
|
OC-3
|
STS-3
|
STM-1
|
155.52
|
OC-9
|
STS-9
|
STM-3
|
466.56
|
OC-12
|
STS-12
|
STM-4
|
622.08
|
OC-18
|
STS-18
|
STM-6
|
933.12
|
OC-24
|
STS-24
|
STM-8
|
1244.16
|
OC-36
|
STS-36
|
STM-12
|
1866.24
|
OC-48
|
STS-48
|
STM-16
|
2488.32
|
It should be noted that special line is the connection that can transport the data modem unit service. Special line can be specifically to be exclusively used in the direct channels that the client uses between two regulation points. Special line can also be called leased line. In one embodiment, special line is that ISDNI basic rate interface (ISDNPRI) connects. ISDNPRI connects the individual signals channel (being called data or D channel) that can comprise on the T1, and other 23 channels are as carrying or B channel. (Bearer Channel is the digital channel of voice-over and data message. If) use a plurality of ISDNPRI circuits, the signaling that is used for all circuits can be transported by single D channel, discharges remaining circuit and only transports Bearer Channel.
The Iv telecommunications service
The telecommunications service amount can be from any network node sending and receiving of communication carrier. Communication carrier for example can comprise LEC, CLEC, IXC and enhanced service provider (ISP). In one embodiment, this service can receive from 5 grades of offices of for example EO104a or from the network node of 3/4 grade of office of for example AT206. Perhaps, network system can also be CLEC or other enhanced service provider (ISP), the world go out Incoming or the whole world exists point (GPOP) or ip intelligent peripherals for example.
Voice service for example refers to that calling party 102a is connected the exchange speech and connects with callee 110a. Importantly it should be noted that this is the point-to-point dedicated path, no matter namely whether utilized bandwidth is all distributed. Then the IXC network that the exchange speech is connected to calling party 102a and EO104a, then arrive AT206, then pass through IXC106a is for example set up between calling party 110a to EO10Sa with by junction line to AT208. In another embodiment, AT206 or IXC106a can also for example be CLEC or other enhanced service provider (ISP), the world goes out Incoming or the whole world exists point (GPOP) or ip intelligent peripherals.
Calling party 102a may be the computer that is connected to server by the speech network data. Data, services for example refers to calling party 102a (utilizing modem) and can be that data between the server 122b of a part of ISP connect. Data connect can be for example at calling party 102a and EO104a, then arrive AT206, then arrive CLEC214, then pass through fixed wireless CLEC209 link to PBX112b, between the modem 130b relevant with server 122b, set up.
C. signaling network
Fig. 2 B more detailed description signaling network 114. Signaling network 114 is the individual networks for the treatment of call establishment, dismounting and supervision between calling party 102 and the callee 110. Signaling network 114 given examples are Signaling System 7(SS-7) (SS7) networks. Signaling network 114 comprises service exchange point (SSPs) 236,238,240 and 242, signal transfer point (STPs) 222,224,226,228,230 and 232 and SCP (SCP) 234.
In the SS7 network, SSPS provides the backbone switches part of SS7 function. SSPS for example can be the combination of voice exchange and SS7 switch, or is connected to the computer of voice exchange. SSPs utilizes primitive and switch communication, creates the grouping that is used for by the transmission of SS7 net.
EOs104a, 108a and ATs206,208 can be expressed as SSPs236 at the SS7 signaling network respectively, 238,240 and 242. Accordingly, the connection between EOs104a, 108a and the ATs206,208 (dotting) can be with connecting 254,256,258 and 268. The type of these links is described below.
STPs serves as the router of SS7 net, generally is provided as attached with the location switch. STPs is routed to destination SSPs from starting point SSPs with Information Selection. On the structure, STPs can and general provide in order to occurring congested or fault provides redundant and shared resource (it is shared namely automatically to carry out load) with " coupling to ". Shown in Fig. 2 B, STPs can multistagely arrange, in order to provide multistage Route Selection for signaling information. For example, the STPs222 of pairing, 224 and the pairing STPs226,228 at the first estate, and the pairing STPs230,232 in the second grade.
SCPs provides database function. SCPs is used in the SS7 net advanced features is provided; be included as extraordinary service number (for example 800 and No. 900) and select route, storage about the information of user's service, provide call card to come into force and usurp protection and advanced intelligent network (AIN) service is provided. SCP234 is connected to the STPs230 and 232 of pairing.
In the SS7 net, has unique link between the heterogeneous networks unit. Table 4 provides the definition of public SS7 link.
Referring to Fig. 2 B, the STP of pairing is to passing through the C link connection. For example, STPs222,224, the STPs226 of pairing, 228 and the STPs230,232 of pairing by C link connection (not shown).
The STPs222 that matches in same grade, 224 and pairing 226,228 by B link 270,272,244 with are connected connection. The STPs222 of different brackets pairing, 224 with the STPs230 that be connected, 232 pass through D link 266,268,274 with are connected connection. Equally, the STPs226 of the pairing of different brackets, 228 with the STPs230 that is connected, 232 by D link 278,280,246 with are connected connection.
SSPs236,238 passes through A link 254 and is connected connection with the STPs222 that is connected, 224. SSPs240,242 passes through link 258 and is connected connection with the STPs226 that is connected, 228.
SSPs236,238 can also be connected to by E link (not shown) the STPs230,232 of pairing. At last, pairing STPs230,232 is connected to SCP234 by link 250 and 252.
For more detailed description SS7 network topology, the reader can be with reference to ISBN0-07-054991-5, NY10020, and New York McGraw-Hill, Russell, the signal system #7 of Travis incorporates its full text here into as a reference.
Table 4
The SS7 link technology | Definition |
Access (A) link | A link connection SSPs is to STPs, or SCPs provides access to netwoks and database access by STPs to STPs |
Bridge (B) link | The STPs of B link connection pairing and the STPs of other pairing |
Intersection (C) link | The C link is connected to each other in the mode of pairing, under normal circumstances, only has network management information to pass through the C link and sends |
Oblique line (D) link | D link layer in the base pairing STPs link with the second layer
For STPs |
Extended (E) link | E SSPs connected to the remote link the paired STPs, and used in the housing
A pair of link congestion STPs |
Perfectly correlated (F)
Link | When a large number of services between SSPs or directly connected to the STP unavailable
When, F link provides a direct connection between the local SSPs (BYPASS
STPs). F link is used only for call setup and disassembly. |
d.SS7 signaling call flow
SS7 telecommunications network in order to initiate a call, the caller is connected to the use of EO switch to game
Phone calls the called party's telephone number. Telephone number from the telephone to the calling party in local
Switch Carrier (LEC) into the Bureau of EO SSP. First, SSP can be processed according to the root meet special
Standards set start and internal routing rules. Second, SSP can issue further signaling
EO or information to another network access tandem (AT), if necessary. Signalling information can be
SSP delivered to STPs, it is game-EO and EO end office or exported between the signal routing.
Export EO has called party's telephone number specified port. If the straight trunk does not exist or if
Straight trunk is full, the call established through repeater tandem direct connection between EOs. If
The call is a long distance call, that is located in a different Local Access Transport Area (LATAs) caller
Between 20 and called party, the call through the interexchange carrier (IXC) switch. Such long-distance calls
Called often called inter-LATA calls. LECs, and IXCs collectively known as the public switched telephone network
(PSTN).
...
SS7 telecommunications network in order to initiate a call, the caller is connected to the use of EO switch to game
Phone calls the called party's telephone number. Telephone number from the telephone to the calling party in local
Switch Carrier (LEC) into the Bureau of EO SSP. First, SSP can be processed according to the root meet special
Standards set start and internal routing rules. Second, SSP can issue further signaling
EO or information to another network access tandem (AT), if necessary. Signalling information can be
SSP delivered to STPs, it is game-EO and EO end office or exported between the signal routing.
Export EO has called party's telephone number specified port. If the straight trunk does not exist or if
Straight trunk is full, the call established through repeater tandem direct connection between EOs. If
The call is a long distance call, that is located in a different Local Access Transport Area (LATAs) caller
Between 20 and called party, the call through the interexchange carrier (IXC) switch. Such long-distance calls
Called often called inter-LATA calls. LECs, and IXCs collectively known as the public switched telephone network
(PSTN).
...
e. Circuit Switched
Circuit switching the duration of the call to provide a channel for the call. Therefore, the use of electric
Circuit switching, requires a lot of switching bandwidth to handle high-capacity voice call. This problem due to the use
Voice circuits designed to handle voice communication via the same device will resume shipping data communications
Miscellaneous.
i. division multiplexing (TDM) circuit-switched
TDM circuit-switched connection the entire time in the inner two created between all connected devices
Ministry time connection or a dedicated circuit. TDM of the bandwidth is divided into a plurality of slots can have a fixed time slot,
Each slot has its own fixed volume available. TDM network each connected device is assigned solid
Fixed part of the bandwidth requirements of the transmission rate with one or more time slots. When the device is in transfer
Send mode, data is only placed in this slot, without the need for such additional processing or translation open
Eliminated. Therefore, TDM is the delivery of services and transparent protocols. Unfortunately, when the device does not send
Data, the time slots remain empty, thus wasting bandwidth use. The device on the network may be a higher rate
In order to slow down or wait for transmission of data, but idle capacity in the transmission of the entire period of time can not be assigned to
A higher priority device. TDM is not suitable for bursty data, and when the burst data is becoming
This organizational data needs standards.
...
TDM circuit-switched connection the entire time in the inner two created between all connected devices
Ministry time connection or a dedicated circuit. TDM of the bandwidth is divided into a plurality of slots can have a fixed time slot,
Each slot has its own fixed volume available. TDM network each connected device is assigned solid
Fixed part of the bandwidth requirements of the transmission rate with one or more time slots. When the device is in transfer
Send mode, data is only placed in this slot, without the need for such additional processing or translation open
Eliminated. Therefore, TDM is the delivery of services and transparent protocols. Unfortunately, when the device does not send
Data, the time slots remain empty, thus wasting bandwidth use. The device on the network may be a higher rate
In order to slow down or wait for transmission of data, but idle capacity in the transmission of the entire period of time can not be assigned to
A higher priority device. TDM is not suitable for bursty data, and when the burst data is becoming
This organizational data needs standards.
...
Figure 1B describes an example of a network 148 connected to the data network 142 includes a workstation 144
And 146. As data network 142 may be a plurality of local area networks (LAN) connection with a wide area
Network (WAN). Network 148 includes an actual local area network, including, for example the client workstation 138 and
Server 136 is a plurality of host computers, the host computer through a network interface card including (NICs)
Cabling and hubs such as Ethernet hubs are connected together. LAN through a network router
140 is connected to the data network 142, network router 140 to allow the data service from the client 138 and server
136 144 and routed to the workstation 146.
a. Packet Switching
Above with reference to Figures 1A and 2A of the circuit-switched connections through the voice network service delivery
100 and 200 are different, the use of packet switched data network 148 transmission services.
Currently, the Internet, intranets and the like of interconnected computer networks usually a public or private data
Uses packet switching technology. Packet switching provides more efficient than circuit-switched communication channel utilization.
Packet switching network packet transfer information, the information may include various types of data, such as digital
Voice, data and video. The use of packet switching, many different call to share a pass
Communication channel rather than the channel dedicated to a single call. During a voice call, for example, the digital
Voice information the caller can be 60% of the time between the transmission and the other 40% of the time, did not
A voice transmission. The use of circuit-switched connections, voice calls can occupy the absence of sound without
With 50% of the bandwidth of the communication channel. For data calls, information can be only 10% of the time
Transfer between the two computers. Use of data calls, 90% of the channel bandwidth is not used. Phase
In contrast, packet-switched connection allows voice calls, data calls, and possibly other call signal
All sent through the same channel.
...
Currently, the Internet, intranets and the like of interconnected computer networks usually a public or private data
Uses packet switching technology. Packet switching provides more efficient than circuit-switched communication channel utilization.
Packet switching network packet transfer information, the information may include various types of data, such as digital
Voice, data and video. The use of packet switching, many different call to share a pass
Communication channel rather than the channel dedicated to a single call. During a voice call, for example, the digital
Voice information the caller can be 60% of the time between the transmission and the other 40% of the time, did not
A voice transmission. The use of circuit-switched connections, voice calls can occupy the absence of sound without
With 50% of the bandwidth of the communication channel. For data calls, information can be only 10% of the time
Transfer between the two computers. Use of data calls, 90% of the channel bandwidth is not used. Phase
In contrast, packet-switched connection allows voice calls, data calls, and possibly other call signal
All sent through the same channel.
...
In a packet switched network, between the receiver and the transmitter there is a single continuous physical connection
Pick. Calls from many different groups together to share with other transmission network bandwidth. These packets
Many different along the same route to the destination, and can therefore set the receiving end
Together. The result is more efficient than circuit-switched telecommunications network bandwidth utilization.
b. Routers
Data Network 142 may include a plurality of network routers 140. Network router for multiple network
Of information between network routing. Router to act between two or more network interfaces. Routing
Can be between any two networks to find the best path between two network even more
Different networks.
Network routers can include a table describing the various network domains. Domains can be considered LAN
(LAN) or wide area network (WAN). Information can be made by network routers across multiple LANs and / or
Transferred between WANs. View router from the packet header of the packet and the destination address of the packet is determined
The purpose of the domain. If the router is not directly connected to the destination area, the router can be grouped election
Optional route to the router's default router, the router hierarchy higher level router. Because
It is connected to each router has a default router, the packet router through a series of
Geographical and accommodate to the destination address of the packet's destination host ultimate goal.
...
Network routers can include a table describing the various network domains. Domains can be considered LAN
(LAN) or wide area network (WAN). Information can be made by network routers across multiple LANs and / or
Transferred between WANs. View router from the packet header of the packet and the destination address of the packet is determined
The purpose of the domain. If the router is not directly connected to the destination area, the router can be grouped election
Optional route to the router's default router, the router hierarchy higher level router. Because
It is connected to each router has a default router, the packet router through a series of
Geographical and accommodate to the destination address of the packet's destination host ultimate goal.
...
Local Area Network (LAN) can be considered by the host computer's network interface cards (NICs) interconnection
Multiple host computers. NICs for example via copper wire connections to allow communication between the host computer. Bureau
Area networks include Ethernet bus, Ethernet switching network, token ring network, optical digital number
According inline (FDDI) network and the ATM network.
Wide Area Network (WAN) is a wide area network connected to the host computer. In order to make specific
The host computer and the LAN to another LAN or WAN host computer communications, there must be interconnected
LANs and WANs network interface. Examples of network interface routers discussed above.
Designed to interconnect multiple LANs and / or WANs network called the Internet (lowercase
"I"). Internet can include a plurality of LANs and WANs passes data between networks. In a
The LAN to another LAN, the host computer and the host computer via, for example between the Internet Protocol (IP) protocol
A communication. IP protocol is used for each of the host computer for the network is assigned a unique IP address,
Allows data packets transmitted over the Internet to other LANs connected to the Internet and / or WANs for
Other main computer. Internet access may include two or more networks interconnected routers.
"Internet" (uppercase "I") is a network connection over the world global Internet
Meridians. Including the global Internet computer network, computer Internet Protocol by agreement (1P) family interaction
Union.
"Intranet" is the use of Internet software and Internet standards, such as Internet Protocol (IP)-
Private network Internet. Intranet can be reserved for the use of the network has received the necessary authorization
Parties to use.
d. exchange for routing
For example in the use of IPX or TCP / IP network protocol architecture of the middle layer routing.
Exchange at a lower level, OSI model layer 2, which medium access control (MAC) layer.
e.TCP / IP packet-center as the center of the circuit ATM data network
Asynchronous Transfer Mode (ATM) is a fixed-size cell switching to circuit-centric data
Net. ATM virtual circuit realization (VCs), virtual paths (VPs) and transmission paths (TPs). ATM-like
The circuit-centric network nodes in the source and destination virtual circuit is established between the nodes through
Over the virtual circuit to a specific traffic type to provide QoS.
Some networks are packet-centric network. And the circuit-centric networks,
Packet-centric networks to transmit data packets without using a dedicated circuit. TCP / IP peer to
In the IP network between the various systems transmit user data package. When large files sent down to co-
Yee stack, IP function is responsible for partitioning and package the data. And the first portion is placed on the data packets using the
To the transfer to the data link. This data routing and switching in IP (i.e. network) layer. IP
In a sense, is a dumb protocol. When a packet is transmitted through the media preparation, IP is not specific
Will route the call to a specific channel. Instead, it will first put into packets and let the network
To deal with. Therefore, the output data packets can take a variety of routes from the source to the destination. This means
Implies that these packets to the data reported in the form rather than the sequence number of other protocols. IP efforts to try
Figure deliver the packet to the destination network interface; but it does not guarantee data will arrive, the data did not
Margin of error, the node along this path would involve their own data accuracy and sequencing, or
Sent back to the sender warning mechanism in error. Is also possible in the packet's IP routing,
Packet can be transmitted along the ring network, so the IP header at its one kinds of mechanisms that allow a
Promise a certain number of "jumps" or so-called network "life cycle." Not allowed unsent data
Package surrounding the network, IP has a counter mechanism, each packet through a network node for impairment.
If the counter expires, the node deletes the packet. IP cooperation with the TCP, it provides control
System to ensure reliable data transmission and transmission stream. On the transmit side, TCP header into the byte count
In the message, the message sent to the IP protocol layer and loaded internally as part of the packet. Meet
When the receiving end to get a packet reordering packets and is responsible for ensuring accuracy. If all of the IP
Streams are not received correctly, the byte count confirmation or acknowledgment message back to the sending end can, tips
Sender to resend the packet filling the rest of the necessary byte stream. TCP buffering another number
According to the package until it is changed to resend unacknowledged packets.
...
Some networks are packet-centric network. And the circuit-centric networks,
Packet-centric networks to transmit data packets without using a dedicated circuit. TCP / IP peer to
In the IP network between the various systems transmit user data package. When large files sent down to co-
Yee stack, IP function is responsible for partitioning and package the data. And the first portion is placed on the data packets using the
To the transfer to the data link. This data routing and switching in IP (i.e. network) layer. IP
In a sense, is a dumb protocol. When a packet is transmitted through the media preparation, IP is not specific
Will route the call to a specific channel. Instead, it will first put into packets and let the network
To deal with. Therefore, the output data packets can take a variety of routes from the source to the destination. This means
Implies that these packets to the data reported in the form rather than the sequence number of other protocols. IP efforts to try
Figure deliver the packet to the destination network interface; but it does not guarantee data will arrive, the data did not
Margin of error, the node along this path would involve their own data accuracy and sequencing, or
Sent back to the sender warning mechanism in error. Is also possible in the packet's IP routing,
Packet can be transmitted along the ring network, so the IP header at its one kinds of mechanisms that allow a
Promise a certain number of "jumps" or so-called network "life cycle." Not allowed unsent data
Package surrounding the network, IP has a counter mechanism, each packet through a network node for impairment.
If the counter expires, the node deletes the packet. IP cooperation with the TCP, it provides control
System to ensure reliable data transmission and transmission stream. On the transmit side, TCP header into the byte count
In the message, the message sent to the IP protocol layer and loaded internally as part of the packet. Meet
When the receiving end to get a packet reordering packets and is responsible for ensuring accuracy. If all of the IP
Streams are not received correctly, the byte count confirmation or acknowledgment message back to the sending end can, tips
Sender to resend the packet filling the rest of the necessary byte stream. TCP buffering another number
According to the package until it is changed to resend unacknowledged packets.
...
Figure 1C illustrate a conventional video network 150, such as cable television (CATV) network. Video Network
150 may include connections to various video capture, video distribution links, and a video output monitor
Network 160. Video input device may include, for example conferencing camera 154 and 158. Video output device
TV set may include, for example 152 and 156. Video network 160 can include a variety of head end (i.e., electric
Cable service side) and used for multicast various video signals such as coaxial cable television (CATV) and the National
Television Standards Code (NTSC) tuner device assignment link device. With standard cable system
There are a very large number of available bandwidth.
Important to note that the CATV is a wireless communication method. Many video signals in the frequency
Rate distribution along the cable at the same time. TV tuner by tuning to a specific frequency or "band" option
Select a specific channel.
While cable television CATV video networks often include only a physical cable, multiple channels can
To simultaneously present in the cable. This is done by sharing the cable spectrum and frequency of use (FDM) group
Sowing the different frequency ranges assigned to different channels. Broadband cable communication system can be completely by
According to CATV system operation. In contrast with FDM technology is no band but the use of the cable into
Sharing multicast (TDM) is divided into time slots. Use of TDM, each station can take the cable to transmit video
The entire bandwidth, but only for a very short time. Cable is currently capable of carrying up to
750MHz. FDM techniques can be used to channel into a plurality of dedicated logical channels. Technical Update
Allow the FDM channel time division multiple access technique (TDMA).
Cable systems allowing two independent multicast dimensions, number achieved through cable
According to the channel. FDM channel separation can be used, a frequency band shared by multiple users via TDMA.
The most common broadband cable TDMA access method is the Ethernet developed XEROX
CSMA / CD.
Using a single cable, carve arrangements can accommodate two-way simultaneous transmission. Another way to accommodate
Transmission mode is the use of dual-cable system.
Broadband method is essentially an analog signal. Because the camera is analog devices such as from
Camera (or VCR) signals can be directly to the red / green / blue (RGB) format for transmission to the width
With cable channels.
G. voice / data / video network convergence
Recognizing the packet switched data network, such as the Internet inherent efficiency, attention has recently
The concentrated to a centralized packet-switched data network digitization and transmission of voice, data, video
And other information. In order to deliver high quality service (QoS) of the end-user experience, data networks attempt
Provide timely transmission mechanism different types of information, and with the appropriate bandwidth to provide an acceptable
End-user experience.
Figure 2C illustrate the data network through the delivery of voice, data and video services in an exemplary network 236.
Network 286 includes caller attribution EO 104b 102b, this EO 104b link to the telephone gateway
288b. Network 286 also includes a called party vested EO 108c 110c, linked to this EO 108c
Telephony Gateway 288c. Eos 104b and 108c and 288b and 288c telephony gateways can be linked to the signaling
Network 114. Telephony Gateway 288b and 288c, respectively, can also be connected via the router 140b and 140c to the data
Network 142.
See also Figure 2C, telephone gateway 288b and 288c can be used for voice traffic and signaling information to the number of
It is packaged as a data network 142 for transmission through the form. For skilled It is clear
Telephony Gateway 288b and 288c significantly can include design for control, call setup and disassembly of the various
Computer equipment. The data transmission network may include, for example, voice call via voice packets
(VoP), by voice data (VoD), Voice over Internet Protocol (VoIP), voice communication
Over ATM (VoATM), voice through the frame (VoF). Telephony Gateway 288b and 288c
An example can be obtained from a variety of manufacturers meet the media gateway control protocol (MGCP), case
Parsippany, New Jersey, such as Lucent and California PaloAlto of CISCO. Important Note required
Attention is also allowed other network device such as VoIP transmission necessary, for example, from soft cross
Association of the company to get more members for softswitch, including Colorado Layer 3 Louisville
Communication.
...
See also Figure 2C, telephone gateway 288b and 288c can be used for voice traffic and signaling information to the number of
It is packaged as a data network 142 for transmission through the form. For skilled It is clear
Telephony Gateway 288b and 288c significantly can include design for control, call setup and disassembly of the various
Computer equipment. The data transmission network may include, for example, voice call via voice packets
(VoP), by voice data (VoD), Voice over Internet Protocol (VoIP), voice communication
Over ATM (VoATM), voice through the frame (VoF). Telephony Gateway 288b and 288c
An example can be obtained from a variety of manufacturers meet the media gateway control protocol (MGCP), case
Parsippany, New Jersey, such as Lucent and California PaloAlto of CISCO. Important Note required
Attention is also allowed other network device such as VoIP transmission necessary, for example, from soft cross
Association of the company to get more members for softswitch, including Colorado Layer 3 Louisville
Communication.
...
Data network 142 may be routed through the network device provides information packet from the source position even
Receiving data network 142 destination location. For example, data network 142 may be used to transmit voice and
Internet data services Protocol (IP) packets from the telephone to the telephone gateway routing gateway 288b
288c. 142 denotes data network known in the art as the center in a packet data network. One well
The data network is known to the global Internet. Other examples include a dedicated intranet, packet switching network,
Frame Relay and Asynchronous Transfer Mode (ATM) network as the center of the circuit.
...
Data network 142 may be routed through the network device provides information packet from the source position even
Receiving data network 142 destination location. For example, data network 142 may be used to transmit voice and
Internet data services Protocol (IP) packets from the telephone to the telephone gateway routing gateway 288b
288c. 142 denotes data network known in the art as the center in a packet data network. One well
The data network is known to the global Internet. Other examples include a dedicated intranet, packet switching network,
Frame Relay and Asynchronous Transfer Mode (ATM) network as the center of the circuit....
Routers 140a, 140b, 140c, 140d, 140e, 140f and 140g light can be made by such
Fiber link connection and the copper wire connected to each other physical media. 140a-g router between each pass
Delivery of information and communicate with each other according to the routing protocol.
Data network 142 may be implemented using any data network such as IP network, ATM virtual circuit-
The center of the network, frame relay network, X.25 networks and other types of LANs and WANs. Other data
Network used interchangeably data network 142, such as FDDI, Fast Ethernet or SMDS packets post
Changer. Frame Relay and ATM is connection-oriented circuit-centric business. The number of multi-megabyte swap
According to the business (SMDS) is a connection-oriented large packets business, providing up to 45Mbps speed.
1 instance data network
a. Asynchronous Transfer Mode (ATM)
ATM is a high bandwidth, low latency, fixed-size cell-based multiplexing network technology.
Bandwidth capacity is divided into 53-byte cells, a header and payload fields. ATM uses solid
Fixed length cells, believed in hardware than fixed-length cells of variable size packets easier
Therefore, in some environments exchange should lead to faster transmission.
ATM environment for circuit-centric approach to establish a virtual circuit. Thus, ATM segmentation using
And reordering algorithm (SAR) of the variable length IP data packet streams into fixed size cells.
Each ATM cell comprises a 48-byte payload field and a 5 byte header
Department, the first to identify the cell called "VC." ATM that is suitable for voice, data
And high-speed video business combination. Currently, ATM access can be as high speed of 622Mbps or higher
Rate of execution. ATM recently doubled every year its maximum rate.
ATM by the International Telecommunication Union (ITU-T), American National Standards Institute (ANSI), ETSI
And ATM Forum has defined the standard protocol. ATM includes a plurality of building blocks, including the transmission path, virtual
Path and virtual channel. Asynchronous Transfer Mode (ATM) is a cell-based switching and multiplexing, set
Into account a wide range of telecommunication services for universal connection-oriented transport mode. ATM can also be used
ATM Forum specified 1AN and private network technologies.
ATM adaptation layer processing directly or through connection-oriented communication, or by using adaptation layer at
Li connectionless communication. ATM virtual connection can be constant bit rate (CBR) or variable bit rate (VBR)
Work. Sent to the ATM network, each ATM cell includes a small header, starting from the first portion includes
Points to the destination as the center to establish a virtual circuit connection. All cells sequentially through this virtual
Connectionless transport. ATM provides permanent or switched virtual connections (PVCs or SVCs). ATM is different
Step, because the transmission of cells need not be periodic, as synchronous transfer mode (STM) to
Data slots.
Using the use of ATM header fields added to each fixed-length payload approximate way.
ATM first virtual channel identification (VC). Thus, the slot can be used for transmission of any data ready
Host. If the host is not ready to be sent, the sending empty or idle cells.
ATM allows the definition of multiplexing and switching method standardized network architecture. Synchronous Optical Network
Network (SONET) provides a very high physical transmission rate basis. According to delays and lost through
Loss of performance for different types of communication to provide a separate virtual circuit, ATM can be used for different supports
With more quality of service requirements (QoS) levels. ATM can also support the available bandwidth class 1AN
Access.
Cell is mapped to the physical transmission path, such as North America, DS1, DS3, and SONET; European E1,
E3 and E4; ITU-T STM standards; and a variety of local fiber and telex payload. All letters
The interest of these fixed-length cells in the ATM network, reuse and conversion.
Heads of department field identifies the ATM cell cell type and priority, and includes six parts. ATM
Letter head portion includes a general flow control (GFC), virtual path identifier (VPI), virtual channel identifier
Character (VCI), the payload type (PT), Call loss priority (CLP) and the first error detection
Test (HEC). VPI and VCI save only local validity and identify the destination. GFC allow reuse
Control the rate of the ATM terminal. PT indicates whether the cell, including user data, signaling data or preserved
Held information. CLP represents the relative priority of the cell, the higher priority during congestion of cells
Deleted before lower priority cells. HEC detection and correction of errors in the header.
Payload field of the ATM cell through the network intact, no error checking or correction
Positive. ATM relies higher layer protocols implementing effective error detection and correction load. For example, transport
Control Protocol (TCP) can be used to perform error correction. Fixed cell size simplifies the ATM switching
Machines and the implementation of the multiplexer and allows high-speed execution.
When the use of an ATM, and other packet-switched networks of different data packets can not be delayed longer
Shorter packets because the packet length is divided into many fixed-length cells. This feature allows
ATM delivered within the same network such as voice and video communication with CBR has a long number of potential
VBR data packet data communications.
When the use of an ATM, and other packet-switched networks of different data packets can not be delayed longer
Shorter packets because the packet length is divided into many fixed-length cells. This feature allows
ATM delivered within the same network such as voice and video communication with CBR has a long number of potential
VBR data packet data communications.
Transmission path may include one or more VPs. Each VP may include one or more
VCs. Therefore, multiple VCs through a single VP relay. Exchange can be in the transmission path, VPs
Or VCs level execution.
ATM switching capabilities to virtual channel layer is similar to the world of private or public telephone switch
(PBX) or telephone switch functions. In the PBX, you can exchange trunk group
For each channel. Executive VC connected device similar to a telephone switch usually known as VC post
Switch. Connect VPs of ATM equipment usually called VP cross-connect, similar to the transmission network. This
Species seems to explain the reasons and should not be taken literally meaningless. ATM cell switching
Machine does not need to exchange VCs and confined only to cross-connect to the VPs.
In the ATM layer to provide users with a virtual path connection (VPC) or virtual channel connection (VCC)
Selection. Virtual path connections (VPCs) only under the virtual path identifier (VPI) value of the exchange. VPC
The user can clear the VPI assigned internally VCCs, since they follow the same route. False
Channel connections (VCCs) according to the combination of VPI and virtual channel identifier (VCI) value of the exchange.
VPIs and VCIs used to route calls through the network. Note VPI and VCI values in a
Body transmission path (TP) is unique.
It is important to note that the data network 142 may be a plurality of other data types in any one network
One, including various types of data in addition to the ATM network packet-switched data network.
b. FR
Alternatively, the data network 142 may be frame relay network. Skill in the art is obvious,
Frame Relay network as a data network 142. Data frame transmission, instead of the ATM cell transfer
Send data.
Frame Relay is used for WANs packet switching protocol, WANs prevalent in the remote location of the
Between the LAN-to-LAN connection. Frame Relay access previous highest at about 1.5Mbps. Today, the
So-called "high-speed" Frame Relay provides about 45Mbps. This rate compared to other technologies such as ATM
Still relatively slow.
Frame Relay services similar to X.25 network using a streamlined version of the data packet switching form. Number
The packet is a frame in the form of variable length. The main advantage of this scheme is that frame relay network can Tolerance
Satisfied with the fact that any agreement on local data packets of various sizes. Frame Relay network is complete
Fully independent of the protocol. Data network 142 frame relay network embodiment agreement not to engage in lengthy transfer
Conversion process, so than some of the other networks to provide faster and cheaper exchange. Frame Relay is also more than
Traditional X.25 network fast because X.25 network is designed to currently available reliable circuit, and performs
Less stringent error checking.
C. Internet Protocol (IP)
In one embodiment, data network 142 may be through the ATM network, Internet Protocol (IP) network.
Skill in the art it is clear that a variety of other data networks, such as Ethernet link layer
Network Internet Protocol (IP) network can be used as data network 142. Data can be transmitted by the TCP segment
Variable-length packet-centric IP packet data graph, rather than fixed length in
Circuit as the center of the ATM cell transfer data. IP data network can be placed in more than one physical line, for example,
Such as SONET optical networks.
2 Virtual Private Network (NPNs)
Virtual Private Network (VPN) is a communication carrier to be operated by a wide area communications network, which
What used to provide the performance of line, and in fact, including public network shared by all customers in the
Following the line. Just as VPN can be provided through cable networks for the business, VPN can provide the wireless network.
VPN allows private network configured within a public network.
VPNs can be provided to the customer by the communication carrier, that their WANs to provide safety, security
Permits and long-haul bandwidth. These VPNs typically frame relay or multi-megabyte data traffic exchange
(SMDS) for the selected protocol, because these protocols define a logical group of users on the network, and
And physical location. ATM has been loved as a VPN protocol, because the company requires a higher
Reliability and greater bandwidth to handle more complex applications. The use of ATM VPNs for the company's
The same virtual network security and QoS, because WANs with special circuit design.
The Internet has produced a lower cost alternative to VPNs, or virtual private network
Net. Virtual Private Internet (VPI) allow the company via the Internet to connect different LANs. Users only
Installing software or a combination of hardware and software, form a network with VPN authentication and encryption capabilities produce a total
Sharing, intranet security. VPI typically use the browser-based management interface.
3.H.323 video conferencing
Will now be a brief overview of Recommendation H.323 for videoconferencing. H.323 standard is based
IP-based networks, including the Internet audio, video and data communications to provide base. By following H.323
Recommendations multimedia products from multiple vendors and applications can interoperate, allowing users to not test
Consider compatibility for communication. H.323 LAN-based products promise to become more multimedia applications
Foundation.
H.323 is derived from the International Telecommunication Union (ITU) recommendations huge, not to mention that it is used to
For ensuring quality of service (QoS) LAN (LANs) set the standard for multimedia communications. These network
Network control desktop organizations today and include packet-switched TCP / IP and Ethernet via
IPX, Fast Ethernet and Token Ring technology. Accordingly, H.323 standards are important criteria member
For a wide range of new cooperation, for LAN-based multimedia communication applications.
H.323 specification was in 1996 by the ITU Study Group 16 approved. Version 2 is 1998
Month approved. The standard range, including stand-alone devices and embedded personal computer technologies to
And point to point and multipoint conferencing. H.323 also addresses call control, multimedia management, and bandwidth management
As well as LANs and other networks of the interface.
H.323 is part of the standard range communication, allowing the network within the TV will
Proposal. Commonly referred H.32X, this series includes H.320 and H.324, ISDN, and its corresponding
PSTN communications.
H.323 defines a structure for network communication based on four major components, including terminals,
Gateways, gatekeepers and multipoint control units (MCUs).
Clients on the LAN terminal is an endpoint, providing real-time, two-way communication. All terminals are supported
Support voice communications; video and data is optional. H.323 provides cooperation different audio and video
And / or data terminal the desired operating mode. H.323 is the next generation of Internet telephony, conference call
Terminals and videoconferencing technology standards.
All H.323 terminals also support H.245, which is used to negotiate channel usage and capacity. Need
Three other components: Q.931 for call signaling and call setup, called the registration / permission /
Status (RAS) component, which is used to communicate with the gateway protocol; and support for sorting
Audio and video packets RTP / RTCP.
H.323 terminal is an optional component video codecs, T.120 data conferencing protocols, and MCU
Capacity.
Gateway is an optional component H.323 conferencing. H.323 gateways can provide many services, most
Minutes H.323 conferencing endpoints and other terminal types translation between functions. Such features include Chuan
Transport format (ie H.225.0 to H.221), and communication between processes (ie H.245 to H.242) turn between
Translation. In addition, the gateway also audio and video codecs transform between the LAN side and the circuit-
Changer side performs call setup and clearing.
Typically, H.323 LAN gateway intended to reflect the characteristics of end-to-SCN endpoint, whereas
Versa. The main application gateway may establish a link with the analog PSTN terminal and the remote operator
H.320 terminals together through circuit-switched network based on ISDN link is established, and in line with the remote H.324
The terminal through the PSTN network link is established.
If you do not need to connect the gateway to other networks, an endpoint in the same LAN as
Communicate directly with other endpoints. Terminals communicate with the gateway using the H.245 and Q.931 protocols.
Using the appropriate transcoder, H.323 gateway 5806 may support compliance H.310,
H.321, H.322, and V.70 terminals.
Many gateway functions left to the designer. For example, the communication through an H.323 gateway
The actual number of terminals of not standardized. Similarly, SCN number of connections, while supporting the
Number of separate meetings, audio / video / data conversion functions and features include multi-point left to manufacture
Providers. By H.323 gateway technology into the H.323 specification, ITU has been positioned to be based on the H.323
Standard conferencing endpoints remain together.
Enable H.323 Gatekeeper network is the most important part. It can act as all calls within the region
Called the center, and to provide for the registration of an endpoint call control operations. In many ways, H.323 network
Gateway acts as a virtual switch.
Gatekeeper perform two important call control functions. The first is used for terminals and gateways
LAN alias address to an IP or IPX address translation, as defined in the specification RAS. The second
Function is bandwidth management, which is also specified within the RAS. For example, if the network manager has been designated
LAN at the same time the number of sessions threshold, once they reach the threshold gatekeeper can reject even further
Pick. Meeting of the total effect is limited to the bandwidth portion of the total available bandwidth; remaining capacity left
To e-mail, file transfer, and other LAN protocols. Can be managed by a single gateway to all final
Terminal, gateway, and multi-point control unit set is called H.323 zone.
...
Gatekeeper perform two important call control functions. The first is used for terminals and gateways
LAN alias address to an IP or IPX address translation, as defined in the specification RAS. The second
Function is bandwidth management, which is also specified within the RAS. For example, if the network manager has been designated
LAN at the same time the number of sessions threshold, once they reach the threshold gatekeeper can reject even further
Pick. Meeting of the total effect is limited to the bandwidth portion of the total available bandwidth; remaining capacity left
To e-mail, file transfer, and other LAN protocols. Can be managed by a single gateway to all final
Terminal, gateway, and multi-point control unit set is called H.323 zone.
...
Although logically independent Gatekeeper H.323 endpoints, the manufacturers can be incorporated into the Gateway Gatekeeper functionality
And MCUs physical implementations.
Gatekeeper in H.323 systems are not required. However, if there is a gatekeeper, the terminal must be
Use Gatekeeper service provided. These define RAS address translation, admission control, bandwidth control
System and the regional management.
Gatekeeper can also play a role in the multi-point connections. In order to support multipoint conferencing, users use
Gatekeeper receive from the meeting point of two terminals H.245 control channel. When switched to the meeting
Multi-point, Gatekeeper H.245 control channel can be retransmitted to the multi-point controller MC. Gatekeeper does not require Office
Li H.245 signaling; it only needs between the terminals or between the terminal and the MC pass.
LANs containing gateways can also include a gatekeeper, the E.164 address of the input is converted into transmission
Address. Because the area defined by the gatekeeper, including internal Gatekeeper H.323 entities calls for a ban
The mechanism of internal functions, so when there are multiple LAN contain a Gatekeeper H.323 entities, the entity
Can be configured into the same area.
Multipoint Control Unit (MCU) to support three or more endpoints meetings. In the H.323 next, MCU
Including mandatory Multipoint Controller (MC), and zero or more multi-processor (MP). MC Office
Li H.245 negotiation between all terminals to determine for audio and video processing public capacity.
MC also adopted to determine which audio and video data stream to be multicast to control conference resources.
MC does not directly deal with any media streams. This leaves MP, MP mixing, exchange and processing sound
Audio, video and / or data bits. MC and MP capacity can be present in the special parts or other H.323
Part of the assembly.
The invention supports multicast wireless base station 302, including: the RFC 1112,1584
Compatibility; recognize and support multicast applications, including: multimedia, conference calls, the number of
Databases, distributed computing, real-time Working Group; support broadcasting via wireless link function; preservation
Bandwidth to maintain QoS latency performance; support IPv6 IGMP multicast and IPv4 IGMP;
Group membership queries, crew status report message.
January 1998 approved the H.323 standard Version 1 Version 2 solves the defects in the existing
Protocols such as Q.931, H.245 and H.225, and a new agreement to introduce new features.
The most significant progress in that safe, fast call set-up, auxiliary services and T.120/H.323 integration.
G. packet-centric wireless point to multipoint focus QoS (PtMP) communication system
A wireless multipoint communication system
Figure 2D describe the network 296, the network 296 including the router 140d connected to the data network 142
Multipoint (PtMP) wireless network 298. Important to note that the network 296 includes Fig. 2C
Network 286 plus PtMP wireless networks 298. PtMP wireless network 298 allows the user location clients
Front-end equipment (CPE) by sharing bandwidth wireless connectivity gets connected to the data network 142
Kind of voice, data and video resources. Wireless PtMP network 298 is a packet-switched network, which is based
TCP / IP packet-centric (ie, IP flow communication in the transmission period does not produce a dedicated circuit) and Note
Weight of QoS.
...
Specifically, PtMP wireless network 298, including through a wired connection to the router for example,
140d of the wireless access point (WAP) 290d. Wireless access point 290e over a wired connection can also be
Connected to the router 140e. WAP290d with 0 one or more wireless transceiver subscriber antenna
292d and 292e wireless communication, such as radio frequency (RF) communication. Skill in the art is very clear
Significantly, the wireless communication method can use such as microwave, cellular, spread spectrum, personal communication system (PCS)
And satellite.
In another embodiment, RF communication over cable television (CATV) coaxial cable.
Will be understood by the skilled person as RF waves to be coaxial waveguide propagation. Accordingly,
The RF transceiver subscriber antenna 292d and a communication link between the WAP 290d may be coaxial
Cable. Thus, the coaxial cable connection is similar to a wireless connection, a wireless connection referred to as the present invention further
Forms.
In another embodiment, RF communication by, for example a low earth orbit (LEO) satellite connections or high
Earth satellite orbit satellite connection implementation. Connection with the LEO satellite as an example, WAP 290d
And RF transceiver subscriber antenna 292d as satellite gateway, according to the invention has another function
Energy.
Skill in the art it is clear that although the present invention is a ring-to-multipoint network,
Described under the environment, the present invention is equally applicable to-point networks.
Referring to Figure 3A, in the embodiment of the present invention, WAPs290d and 290e can be connected to the non-
The radio base station 302, in "IP flow" can be queued, analysis, feature representations, classification, priority row
Procedures and scheduling, as more fully below with reference to the accompanying drawings described later in.
Refer to Figure 3B, an embodiment of the present invention, an antenna 292d, and 292e are connected to the user
Customer premises (CPE) station 294d and 294e (also known CPEs294d, 294e). User CPE station 294d
And 294e via a wired or wireless connection to connect to a variety of other CPE devices. For example, CPE station 290d
And 290e can be connected to a voice caller 124d, 124e, 126d and 126e, 116d, and fax machines
116e, including video monitors and video cameras 154d 152d and 152e and 154e of video conferencing equipment,
Including the client computer and the server 122d 120d and 120e and 122e of the main computer. Such as PBXs
A variety of legacy devices can be connected to CPEs294d and 294e. In addition, next-generation technologies, for example,
From CA, SanJose of CISCO Systems subsidiary Selsius get Ethernet telephones and their
It means the Internet via a LAN connection can be connected to CPEs294d and 294e. Other meetings TV set
Preparation and compliance with the H.323 conferencing equipment can also be connected to CPEs294d and 294e.
...
Refer to Figure 3B, an embodiment of the present invention, an antenna 292d, and 292e are connected to the user
Customer premises (CPE) station 294d and 294e (also known CPEs294d, 294e). User CPE station 294d
And 294e via a wired or wireless connection to connect to a variety of other CPE devices. For example, CPE station 290d
And 290e can be connected to a voice caller 124d, 124e, 126d and 126e, 116d, and fax machines
116e, including video monitors and video cameras 154d 152d and 152e and 154e of video conferencing equipment,
Including the client computer and the server 122d 120d and 120e and 122e of the main computer. Such as PBXs
A variety of legacy devices can be connected to CPEs294d and 294e. In addition, next-generation technologies, for example,
From CA, SanJose of CISCO Systems subsidiary Selsius get Ethernet telephones and their
It means the Internet via a LAN connection can be connected to CPEs294d and 294e. Other meetings TV set
Preparation and compliance with the H.323 conferencing equipment can also be connected to CPEs294d and 294e.
...
Returning to Figure 3A, the invention described PtMP example of a perspective view of the network 300. Figure 300 includes
User location 306a, 306b, 306c, 306d, 306e, 306f, 306g, 306h, 306i, and
306j wireless communication radio base station 302. Specifically, the radio base station 302 via the wireless access point 290d
306a-j and the user positions the user communication antenna 292a-j.
Wireless base station 302 via the interface 320 such as a wired connection to connect to the network router 140d.
Network router 140d is connected to the data network 142, data network 142 includes various other network routing
Business unit 140b is used to select the data is routed to other nodes on the network 142, such as a telephone gateway
288b.
Back to Figure 3B, described to further illustrate the present invention a block diagram of a wireless PtMP 310. Fig 310
Included in the interface 320 is connected to a data network 142, the radio base station 302. Also connected to the data network 142
Telephone gateway router 140d and 288b, 288b in EO 104b telephone gateway connected to the five centers
Office (CO) switches. IP telephony gateway 288b for example, packets can be transformed into the time domain multiplexing
(TDM) standard telephone signals and thus will terminate to the PSTN telephone service equipment. The radio base station
302 WAP 290d and 292d via the antenna at the user location and wireless CPE 294d 306d communication. To
Skill in the art is obvious, CPE 294d of the other structures are possible, for example, no
A telephone device or a plurality of host computers, the host computer without one or more phone
Machine, one or more host computers and one or more telephone apparatus, and one or more H.323
Able to hold video conferencing platform, which may include a host computer monitors and cameras.
...
Back to Figure 3B, described to further illustrate the present invention a block diagram of a wireless PtMP 310. Fig 310
Included in the interface 320 is connected to a data network 142, the radio base station 302. Also connected to the data network 142
Telephone gateway router 140d and 288b, 288b in EO 104b telephone gateway connected to the five centers
Office (CO) switches. IP telephony gateway 288b for example, packets can be transformed into the time domain multiplexing
(TDM) standard telephone signals and thus will terminate to the PSTN telephone service equipment. The radio base station
302 WAP 290d and 292d via the antenna at the user location and wireless CPE 294d 306d communication. To
Skill in the art is obvious, CPE 294d of the other structures are possible, for example, no
A telephone device or a plurality of host computers, the host computer without one or more phone
Machine, one or more host computers and one or more telephone apparatus, and one or more H.323
Able to hold video conferencing platform, which may include a host computer monitors and cameras.
...
(2) network protocol stack structure - wireless IP network access structure (WINAAR)
...
Figure 4 illustrates the present invention, the radio IP network access structure (WINAAR) 400. Structure 400 Description
Network protocol stack, it is through the exchange of data packets, shared bandwidth, enhanced support for wireless PtMP connection
IP-centric QoS of the TCP / IP protocol stack version. Network protocol stack will be based on open systems interoperability
Union (OSI) 7 layer network protocol stack standard description, the standard includes a physical layer (OSI Layer 1) 402, data
Link Layer (OSI Layer 2) 404, the network layer (OSI layer 7) 406 and 408, the transmission layer (OSI layer 4) 410 and be
A layer (OSI layer 7) 412.
a. physical layer
In one embodiment, the physical layer 402 may be application-specific integrated circuits using a plurality of radio
(WASICs), the active 16QAM/QPSK 416 ASIC implementation; multipath interference mitigation and offsetting
(IMMUNE) / RF 418 ASIC algorithm used to minimize and / or eliminate harmful interference; and FM
(FH) 419 ASIC, for a given frequency according to the noise level to change the frequency level to provide optimized data link
Lu integrity of the dynamic and adaptive multi-channel transmission. Physical layer 402 may include a radio frequency (RF)
Signal 415.
b. data link layer
The data link layer 404 is located above the physical layer 402. Data link layer 404 may include a media
Media access control (MAC) layer 414, which represents a diagram 400 with reference to FIG MAC layer portion 414a and super
Before reservation-based intelligent multi-media access (PRIMMA) technical part 414b and 414c. Arrow
426, 428 and 430, respectively, illustrate the MAC layer 414 from 425 to read data and multimedia applications first
Information, TCP/IP427 and IP429 layer analysis and scheduling "IP flow" of the IP packet. IP IP flow
By analyzing the data packet header information is identified to determine the IP flow QoS requirements, IP flow
Is characteristic expressions, classification, presentation, prioritization and scheduling.
...
C. Network Layer
1 The Internet Protocol (IP)
Network layer 408 is the Internet Protocol (IP) 429. As discussed further below and above the reference
Already discussed data network 142, IP address information packet is the standard protocol. Referring now to Figure 7,
Field of the IP header 702 may include, for example, the source and destination IP addresses, IP service type (TOS),
Lifetime (TTL), and protocol fields. IP is the network failure very flexible Datagram Protocol
Meetings, but can not guarantee order delivery. Routers use the Internet Control Message Protocol (ICMP)
Transmission error and control messages to the other routers. ICMP can also provide a function, which uses
Users can send "sound pulse signal" (reflection data packet) to verify reachability and IP address Host
The round trip delay. Another OSI layer 3 protocol is Address Resolution Protocol rate (ARP), which can be directly
Then access to the data link layer. ARP mapping physical address, such as Ethernet MAC address to an IP address.
...
Network layer 408 is the Internet Protocol (IP) 429. As discussed further below and above the reference
Already discussed data network 142, IP address information packet is the standard protocol. Referring now to Figure 7,
Field of the IP header 702 may include, for example, the source and destination IP addresses, IP service type (TOS),
Lifetime (TTL), and protocol fields. IP is the network failure very flexible Datagram Protocol
Meetings, but can not guarantee order delivery. Routers use the Internet Control Message Protocol (ICMP)
Transmission error and control messages to the other routers. ICMP can also provide a function, which uses
Users can send "sound pulse signal" (reflection data packet) to verify reachability and IP address Host
The round trip delay. Another OSI layer 3 protocol is Address Resolution Protocol rate (ARP), which can be directly
Then access to the data link layer. ARP mapping physical address, such as Ethernet MAC address to an IP address.
...
IP429 network layer 408 may be, for example, IP version 4 (IPv4) or IP version 6 (IPv6).
IPv6 (sometimes referred to as the next generation Internet Protocol or IPng) is the IPv4 Internet Protocol version
Backward compatible extensions. IPv6 is designed to solve the problems caused by the success of the Internet (such as addresses run out
Space and router table). IPv6 also add the required features, including circuit security, auto-configuration
And similar QoS real-time business. Increasing use of the Internet and the many available IP address assignment
Increased production capacity has been addressing urgent needs. Using 32 bytes IPv4 address is formed, it
Can provide about four billion different network addresses. In contrast, IPv6 addresses use each
128 bytes, it provides a greater amount of available addresses.
...
IP429 network layer 408 may be, for example, IP version 4 (IPv4) or IP version 6 (IPv6).
IPv6 (sometimes referred to as the next generation Internet Protocol or IPng) is the IPv4 Internet Protocol version
Backward compatible extensions. IPv6 is designed to solve the problems caused by the success of the Internet (such as addresses run out
Space and router table). IPv6 also add the required features, including circuit security, auto-configuration
And similar QoS real-time business. Increasing use of the Internet and the many available IP address assignment
Increased production capacity has been addressing urgent needs. Using 32 bytes IPv4 address is formed, it
Can provide about four billion different network addresses. In contrast, IPv6 addresses use each
128 bytes, it provides a greater amount of available addresses.
...
IP429 network layer 408 can be enhanced RSVP. Developed to increase the IPv4 QoS features,
RSVP should be applied according to the bandwidth requirements of the Network Manager to allocate the bandwidth. Basically,
RSVP is emerging communication protocol, hoped that the communication protocol in order to signal to the router
Real-time data, video and audio services reserved bandwidth real-time transmission.
...
IP429 network layer 408 can be enhanced RSVP. Developed to increase the IPv4 QoS features,
RSVP should be applied according to the bandwidth requirements of the Network Manager to allocate the bandwidth. Basically,
RSVP is emerging communication protocol, hoped that the communication protocol in order to signal to the router
Real-time data, video and audio services reserved bandwidth real-time transmission....
RSVP signaling scheme in its Unfortunately only two levels of priority. In each of the
Router hops to low or high priority level to identify packets. However, in congested networks, divided
Two level is not enough. Further, in a sort of router hops priority data packets can be
Next jump rejected.
In 1997 be accepted as the IETF standard, RSVP does not attempt to manipulate who should receive bandwidth
But when multiple users need a lot of bandwidth, what will happen when the problem still exists. Eye
Before this situation provides the technology first-come first service response. IETF has formed a special working group
To consider the issue.
Because RSVP provides special business class, many people believe that the agreement with the same QoS.
For example, Cisco will now be used in its RSVP IPv4-based interconnection router operating system,
In order to transmit IPv6 types of QoS characteristics. However, RSVP QoS only a small part of the image,
Because it is only in a given client / server connection is valid. Although RSVP allows the application requests, etc.
Waiting time and bandwidth, but RSVP is not congestion control, or the entire network priority to provide the entire enterprise
Integrated QoS required traffic management. In addition, RSVP is not resolved through the wireless medium number of transfers
According to the package for specific challenges.
The present invention is achieved by providing the RSVP: (1) compatibility with RFC2205; (2) identifying and
Support RSVP messages, including: Path message, reservation (Resv), the path teardown message, resv
Teardown message, path, error messages, Resv error information and confirmation messages. (3) identify and support
RSVP target, Null, Session, RSVP_Hop, Time_Values, Style,
F10wspec, Sender_Template, Sender_Tspec, Adspec,
Error_Spec, Policy_Data, Integrity, andScope,
Resv_Confirm; (4) RSVPF10wspecs structure transform for the radio base station 302
QoS resource allocation.
The present invention provides DiffServ and RSVP / int-serv support is provided via:
(A) support for RFC 2474 and 2475; (2) in the Internet core Diffserv; (3) for the primary
And edge networks RSVP / int-serv; (4) compatibility allows for DiffServ control; (5)
Differences in business (DSs) (fields marked with DiffServ support, and transform to a wireless base station 302
Resource allocation);, and (6) to support the plurality of end coupled to a tunnel session sessions.
4 Real-time Transport Protocol (RTP) and Real Time Control Protocol (RTCP)
TCP transport layer 410 may have enhanced RTP and RTCP. Real-time Transport Protocol (RTP)
Is emerging Internet protocol by IEIF audio / video transport working group support.
Referring to Figure 7, RTP and RTCP header fields 708 may include a plurality of sub-information fields. RTP support
Packet switching network through interactive real-time voice and video transmission. RTP is to provide content identification,
Packet sequencing, timing of reconstruction, loss detection and secure a detailed protocol. Using RTP, data
Delay can be restricted to one or more of the transmission destination.
RTP and other Internet real-time protocols, such as Internet data stream protocol version 2 (ST2) of
Focus on the data delivery efficiency. RTP and RTCP other similar Internet real-time protocol
Is designed for continuous and exchange large amounts of data communication session. RTP does not pre-processing resources
Stay or QoS control. However, RTP dependent resource reservation protocols such as RSVP, dynamic send to
Assign the appropriate bandwidth.
RTP time stamp and the first to join, is used to distinguish whether the IP packet data or voice,
Allows prioritization of voice packets, but RSVP reserved bandwidth allows the network devices used for transporting
Continuous multimedia data streams.
Real Time Control Protocol (RTCP) is accompanied by the RTP protocol of network conditions. RTCP to
Multi-player mode work to provide feedback to the RTP data sources and all session participants.
Can stop using RTCP packets via a private IP network for voice transmission over IP. Use RTCP,
Software can notify the network transmission peak periods adjusted for changes in formation or change the network
Load. Use RTCP feedback network, telephone connection software can respond to downgrade conversion contraction operators
France.
5.IP multicast protocols
Network layer 408 IP429 also supports multicast protocol. Digital voice and video, including a large number of
The data, when the data is divided into packets, and the data must be transferred in the order and the correct manner,
In order to maintain the quality of the initial content. Protocol development has focused on ways to provide effective
Send content to multiple recipients transmission, called multicast. Including a plurality of multicast to the relationship
Department of broadcasting a message from one host to multiple hosts. Network device to broadcast the message to a selected
Group other devices, such as LAN, WAN or internet PCS or workstation. For example, the routing
Can be about the routing table updates sent to other routers in the network.
...
Network layer 408 IP429 also supports multicast protocol. Digital voice and video, including a large number of
The data, when the data is divided into packets, and the data must be transferred in the order and the correct manner,
In order to maintain the quality of the initial content. Protocol development has focused on ways to provide effective
Send content to multiple recipients transmission, called multicast. Including a plurality of multicast to the relationship
Department of broadcasting a message from one host to multiple hosts. Network device to broadcast the message to a selected
Group other devices, such as LAN, WAN or internet PCS or workstation. For example, the routing
Can be about the routing table updates sent to other routers in the network.
...
Real-time Transport Protocol (RTP) is an IETF draft currently designed for applications such as video and voice
To-end, real-time transmission. RTP operation User Datagram Protocol (UDP), provides no guarantee
The timely delivery, quality of service (QoS), send or transfer order. RTP mixer and transformed with
Work well together to support encryption and security. Real Time Control Protocol (RTCP) is the analysis of network intelligence
RTP-shaped part of the definition. RTCP provides businesses forced to monitor and collect information on participants' letter
Interest. RTP and RSVP traffic to dynamically allocate appropriate bandwidth.
...
Real-time Transport Protocol (RTP) is an IETF draft currently designed for applications such as video and voice
To-end, real-time transmission. RTP operation User Datagram Protocol (UDP), provides no guarantee
The timely delivery, quality of service (QoS), send or transfer order. RTP mixer and transformed with
Work well together to support encryption and security. Real Time Control Protocol (RTCP) is the analysis of network intelligence
RTP-shaped part of the definition. RTCP provides businesses forced to monitor and collect information on participants' letter
Interest. RTP and RSVP traffic to dynamically allocate appropriate bandwidth....
RSVP protocol can be used to host the application on behalf of the network to request a particular data stream
Body QoS. RSVP protocol router can use the QoS control requests to all the necessary network
Network nodes in order to establish and maintain necessary to provide the status of the requested service. RSVP requests are usually
But does not necessarily lead to resource reservation along the data path to each node.
...
RSVP itself is not a routing protocol. RSVP designed to work with current and future unicast and multicast routing
By the operation of the protocol. RSVP processing access local routing database for routing. In the case of
If the multicast case, the host sends IGMP messages to join a multicast group, and then sends RSVP messages
Moves along the transfer path of the reserved resource group. Routing protocol packets transported to determine where. When the
Packet delivery time depending on the chosen route RSVP only concerned with these packets QoS. The present invention through
Transmitted over a shared focus on QoS in wireless bandwidth wireless PtMP access, and consider the number of IP flows in
The packet header to provide the priority level information receives the IP stream bandwidth transmission via the radio base station.
...
RSVP itself is not a routing protocol. RSVP designed to work with current and future unicast and multicast routing
By the operation of the protocol. RSVP processing access local routing database for routing. In the case of
If the multicast case, the host sends IGMP messages to join a multicast group, and then sends RSVP messages
Moves along the transfer path of the reserved resource group. Routing protocol packets transported to determine where. When the
Packet delivery time depending on the chosen route RSVP only concerned with these packets QoS. The present invention through
Transmitted over a shared focus on QoS in wireless bandwidth wireless PtMP access, and consider the number of IP flows in
The packet header to provide the priority level information receives the IP stream bandwidth transmission via the radio base station.
...
At the network layer 406 also describes the optional virtual private network (VPN) protocol, Point to Point Protocol
(PPP) 420 and IPsec 422, as discussed below.
...
At the network layer 406 also describes the optional virtual private network (VPN) protocol, Point to Point Protocol
(PPP) 420 and IPsec 422, as discussed below....
At the network layer 406 also describes the optional virtual private network (VPN) protocol, Point to Point Protocol
(PPP) 420 and IPsec 422, as discussed below....
1 Point to Point Tunneling Protocol (PPTP)
Point to Point Tunneling Protocol (PPTP) to provide in addition to IPsec uses other than for the other VPN Security
A scheme. Different with IPsec, IPsec is designed to encrypt data via the Internet through the two flow
LANs are linked together, PPTP allows users to support PPTP PPTP server or an ISP via
Internet connection to an organization's network. PPTP was proposed in early 1996, the IETF standards.
Firewall manufacturers expect support PPTP.
PPTP by Microsoft and 3Com, Ascend and US Robotics with the development, currently in
Is available from Microsoft's Redmond, Washington, get WINDOWS NT Server 4.0
, WINDOWS NT Workstation 4.0, after upgrading WINDOWS 95 and WINDOWS
98 implementation.
PPTP in the "tunnel" means mounted within the message, so in the server and the client
Generating a tunnel, the message will be encrypted and then transmitted over the Internet PPTP, the combination process can be
Resources.
2 Layer 2 Forwarding (12F) protocol
Developed by Cisco Layer 2 Forwarding Protocol (12F) with PPTP is similar in that it also loads
TCP / IP data packet within another protocol is used internally transmitted over the Internet, or any other
TCP / IP network, such as data network 112. Unlike PPTP, 12F 12F requires a dedicated line with the
Router (it needs to be changed to a LAN or WAN infrastructure), running on the network protocol stack is low
Layer does not need TCP / IP routing capabilities. 12F also offers could find beyond PPTP username
And the extra security password.
3 Layer 2 Tunneling Protocol (12TP)
Layer 2 Tunneling Protocol (12TP) combined 12F and PPTP specification. In November 1997, IETF approved
Quasi-12TP standards. Cisco will 12TP Internet into its operating system software, Microsoft will it
Into the WINDOWS NT 5.0; 12TP main advantage over IPsec, IPsec covered only
TCP / IP communication, while 12TP can carry multiple protocols. 12TP also provided through the transmission of non-IP network
Capability. But 12TP ignore data encryption, and data encryption is the use of the network administrator with confidence
VPNs is an important safety feature.
4.IPsec
The invention supports the use of encryption security features IPsec422 the IP stream. Integrated IPsec422
Stream WINAAR structure 400 will be described below with reference to Figures 17A and 17B, respectively, the following line links and on
Description downlink direction. Wireless base station 302 through the firewall placed in the wireless base station supports IPsec
Encrypted traffic prioritization and decrypt the data prior to analysis in identifying streams and data packet header information.
Through the wireless transmission medium, the frame data including the frame data stream has been encrypted, and frequency-hopping.
IPsec provides security for e-commerce such as VPNs and secure data transmission. IPsec and
RFC2401-2407 compatible. IPsec supports IPv4 and IPv6, and IPsec tunnel mode. The radio base station
302 security protocols supported including the identification header (AH) and Load Security Payload (ESP). No
Line the base station 302 supports IPsec authentication (MD5), encryption algorithms and automatic key management (IKE and
ISAKMP / Oakley). The radio base station 302 provides a transport mode or tunnel mode is selected and
Selectable interval scale security operations, such as all traffic between two hosts provide a single
Encrypted tunnel, or each TCP connection between hosts provide independent encrypted tunnel.
e. transport layer
1 Transmission Control Protocol / Internet Protocol (TCP / IP) and User Datagram Protocol / Internet Protocol
Yee (UDP / IP)
As already discussed, the Internet Protocol (IP) has become the primary network currently used
Agreement. This is the most successful part of the Internet, it is based on the Transmission Control Protocol / Internet Protocol
Yee (TCP / IP) protocol suite. TCP / IP is connected to PCs, workstations and servers most commonly used method.
TCP / IP contains the part of many software products, including desktop operating systems (for example, Microsoft
For Windows 95 or Windows NT) and LAN operating systems.
The most common LAN protocol from Novell's NetWare network operating system
(NOS) IPX / SPX. However, IPX / ISPX being lost to TCP / IP. Novell will now own
IP support into the NetWare, NetWare needs to end when a TCP / IP connection number IPX transport
Fashion IPX packets into data packets. UNIX and Windows NT servers can use TCP / IP.
The Banyan VINES, IBM's OS / 2 LAN Server, and other operating systems can use
TCP / IP.
Transport layer four 410 may include a set of standard network protocols TCP / UDP / IP protocol suite
Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) 427 section. As illustrated below
Further discussion of the above-referenced data network 142 has a brief mention, TCP is a standard protocol
Proposed for the source and destination IP address into the business between packet transmission, re-group
Loading and retransmission of information packets. Referring now to Figure 7, TCP header field 706 may include, for example, the letter
The source and destination port number, the window size, the emergency indicator mark (SYN, ISN, PSH,
RST, FIN) and the maximum segment size (MSS). TCP and UDP to TCP / IP hosts to provide a
Force, in order to distinguish between multiple applications through a port number. TCP can provide reliable data for the application and
Transmitted sequentially. TCP data stream can also provide adaptive information flow control, segmentation, reassembly
And prioritization. Only unacknowledged UDP datagram capabilities. Recently, real-time protocol definition
(RTP), RFC1889 can provide support for multimedia applications such as real-time capabilities.
...
Transport layer four 410 may include a set of standard network protocols TCP / UDP / IP protocol suite
Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) 427 section. As illustrated below
Further discussion of the above-referenced data network 142 has a brief mention, TCP is a standard protocol
Proposed for the source and destination IP address into the business between packet transmission, re-group
Loading and retransmission of information packets. Referring now to Figure 7, TCP header field 706 may include, for example, the letter
The source and destination port number, the window size, the emergency indicator mark (SYN, ISN, PSH,
RST, FIN) and the maximum segment size (MSS). TCP and UDP to TCP / IP hosts to provide a
Force, in order to distinguish between multiple applications through a port number. TCP can provide reliable data for the application and
Transmitted sequentially. TCP data stream can also provide adaptive information flow control, segmentation, reassembly
And prioritization. Only unacknowledged UDP datagram capabilities. Recently, real-time protocol definition
(RTP), RFC1889 can provide support for multimedia applications such as real-time capabilities.
...
Operation via TCP IP data network 142 to provide end to end reliable transmission. TCP through dynamic
Reduce the size of the control window size or fragment unrecognized during transmission of data. Reverse is also this
Likewise, if all the involved network elements having a low error rate increased or fragment of a window size value
Achieve higher throughput, support for larger data packets and sufficient buffer to support larger window size
Small.
...
f. Application Layer
Application layer 412 may include application 426 seven, for example, by TCP, Hypertext Transfer Protocol
(HTTP), File Transfer Protocol (FTP), TE1NET remote login, Simple Mail Transfer Protocol
Yee (SMTP); and through UDP, Simple Network Management Protocol (SNMP), RPC, NFS, and TFTP.
Other applications can also be run through the network stack, for example, from the VA, Reston obtained in case of AO1
Such as NETSCAPE NAVIGATOR web browser, available from NY, Armonk's IBM may
To such LOTUS 123 spreadsheet application or from WA, Redmond Microsoft get
For example MSNetMeeting conference television program. From this application requires special data packet transmitted
Special handling and prioritization in order to achieve the appropriate end-user QoS.
3.PRIMMA IP stream prioritization methods
a. mixed IP flow scheduler
Figure 6 illustrates a block diagram of IP flow scheduler 600 mixed. 600 represents a block diagram of a radio base station 302
Scheduling. Block Diagram 600 features include Internet PRIMMA management, VPN, and real-time IP traffic.
Returning to Figure 3A, wireless IP stream from the data network 142 via a network router to reach the wireless base station 302 140d
The interface 320. IP flow and scheduling for the radio base station 302 via antenna 290d by the user location
306d 292d for transmission via an antenna.
Returning to Figure 6, a block diagram 600 is shown in which the interface 320 and the wireless base station antenna 290d
Between the downlink and uplink traffic. As described here, IP flow is defined from the source to the destination
Landlords series of computer data packets transmitted. From the data network 142 (via interface 320) of
IP stream 630 including Internet IP stream 608, VPNIP streaming real-time IP flow 610 and 612. IP stream 630 is the next
Downlink direction.
Downlink IP flow analyzer 602 (hereinafter referred to as downlink flow analyzer 602) analyzes Internet
IP stream 608, VPNIP streaming and real-time IP flow 610 612. IP flow analyzer 602 further participation in the following
According to 8A and 15A described. IP packet stream analyzer 602 receives and analyzes a packet header field to
Identify new or existing IP flow. IP flow analyzer 602 can also be part of the data field within the packet header
Characterized in that the IP flow volume formulation QoS requirements. IP flow analyzer 602 can classify IP traffic and make a given
And from the existing IP packet stream associated with other packets and QoS requirements can be similar
The IP flow together. IP flow analyzer 602 can also be presented to the IP stream flow scheduler.
Downlink PRIMMA MAC IP flow scheduler 604 (hereinafter referred to as downlink traffic scheduling
604) the received IP flow scheduler 608, 610 and 612 are used to transmit the downlink direction along. Downstream
Link flow scheduler 604 can prioritize different levels of IP flows. For example, the scheduler 604 may
In the downlink frame slots reserved for IP streaming latency sensitive; for FIP types of IP
Stream 608, the scheduler 604 can allocate a lot of bandwidth for file transfers; and for e-mail
Type of IP flow 608, the packet may be given a lower priority. In prioritizing wireless
Bandwidth allocation frame slots in the downlink flow scheduler 604 may be considered a virtual IP stream 630 is derived from
Intends Private Network (VPN) for VPNIP stream 610, for example, combined with enterprise communication network for remote branch offices. All
VPN service from a higher priority can be given, or specific types of VPN services can
Request a special class of service. Downlink flow scheduler 604 can prioritize real-time IP traffic
612, which appears as needed to reach these IP streams on the CPE subscriber location 306 CPEs 294.
...
Downlink PRIMMA MAC IP flow scheduler 604 (hereinafter referred to as downlink traffic scheduling
604) the received IP flow scheduler 608, 610 and 612 are used to transmit the downlink direction along. Downstream
Link flow scheduler 604 can prioritize different levels of IP flows. For example, the scheduler 604 may
In the downlink frame slots reserved for IP streaming latency sensitive; for FIP types of IP
Stream 608, the scheduler 604 can allocate a lot of bandwidth for file transfers; and for e-mail
Type of IP flow 608, the packet may be given a lower priority. In prioritizing wireless
Bandwidth allocation frame slots in the downlink flow scheduler 604 may be considered a virtual IP stream 630 is derived from
Intends Private Network (VPN) for VPNIP stream 610, for example, combined with enterprise communication network for remote branch offices. All
VPN service from a higher priority can be given, or specific types of VPN services can
Request a special class of service. Downlink flow scheduler 604 can prioritize real-time IP traffic
612, which appears as needed to reach these IP streams on the CPE subscriber location 306 CPEs 294.
...
In the uplink direction, the subscriber station from the CPE CPE 294d 306d of the IP flow 626
Wireless base station antenna 290d reception. IP stream 626 may include the Internet IP stream 618, VPNIP stream 620
And real-time IP flow 622. Uplink IP flow analyzer 602 (hereinafter uplink flow analyzer 632)
Analysis of Internet IP stream 618, VPNIP streams 620 and 622 real-time IP traffic. 8B and 15B below with reference to FIG.
Further described uplink stream analyzer 632. In one embodiment, IP functionality stream analyzer 632
To appear in the position 306d of the CPE CPE 294d, and sends the number of transfers to the wireless base station 302
According to the request, including information on CPE 294d will be scheduling uplink timeslot IP flow information.
In the uplink direction, the subscriber station from the CPE CPE 294d 306d of the IP flow 626
Wireless base station antenna 290d reception. IP stream 626 may include the Internet IP stream 618, VPNIP stream 620
And real-time IP flow 622. Uplink IP flow analyzer 602 (hereinafter uplink flow analyzer 632)
Analysis of Internet IP stream 618, VPNIP streams 620 and 622 real-time IP traffic. 8B and 15B below with reference to FIG.
Further described uplink stream analyzer 632. In one embodiment, IP functionality stream analyzer 632
To appear in the position 306d of the CPE CPE 294d, and sends the number of transfers to the wireless base station 302
According to the request, including information on CPE 294d will be scheduling uplink timeslot IP flow information....
Uplink PRIMMA MAC segmentation and reordering (SAR) and framer 636 (hereinafter,
SAR and framer 636) can be segmented and receives an IP packet stream framing for wireless media
Referral from the CPE subscriber location 306 CPEs 294 transmitted to the radio base station 302, to further pass
Transmission over the data network 142. The location of the user from the CPE CPE 294d 306d 626 from IP streaming
Connected to the CPE subscriber location of CPE 294d 306d 292d user antenna RF communication through, for example,
Cable modems, and satellite communications to the base station antenna wireless medium 290d.
...
b. downlink and uplink subframes prioritized overview
Figure 8A is a block diagram of an exemplary downlink 800 summary analysis, prioritization and scheduling functions
Energy. Similarly, a block diagram 830 of Figure 8B summary of exemplary uplink priority ranking and
Scheduling function. 800 and 830 is a block diagram showing a block diagram 600 in Figure 6 features a more detailed diagram.
In block 800 (Figure 8), the path of which describes how to perform the downlink shared without
IP flow line bandwidth prioritization and scheduling, data network from 142 - to the interface to the router 140d-
320 - to 302-WAP290d-radio base station through a wireless medium - to the wireless transceiver subscriber antenna
292d-306d to the location on the user's user CPE CPE station 294d.
IP flow analyzer 602 pairs downlink frame scheduler perform recognition, feature presentation, classification, and
Render the data packet functions. 15A described with reference to FIG recognition, feature presentation, classification and presentation of data
Package functionality.
During recognition, that portion of the data fields in the packet header to determine the number of input IP data stream
According to the package is known as a system, which is "an existing IP flow", or the new IP data stream of the first data
Package. Identification may also include for example, determine the data source packet in order to extrapolate the data packet payload
Type of information.
Expressed in the feature, the system previously unknown new packet (the new IP data flow) under
Packet header information feature representation to determine the QoS requirements of IP data stream, and identification receive IP
CPE station user data stream.
During the classification, the new IP data stream is divided into traffic priority. Classification can also include
IP streams from different characteristics similar grouping together as a single data packet level. IP flow 630, etc.
Level Subject instance illustrated as IP Rating 810a-810g.
During the display period, to initialize the new IP data flow and presents it to the downlink flow scheduler 604.
Downlink flow scheduler queue priority level will be based on IP data stream packets placed
The class queue, and using a set of rules, with the advance reservation packet scheduling algorithm used by the
Transmitted to the wireless medium position 306 in the user's user CPE CPE station 294. The rule from the input to the
The downlink scheduling information to determine, based on the downlink scheduler such as multi-level priority
Level sorting, virtual private network (VPN) for directory-enabled data priority (for example, directory-enabled contact
Network (DEN)) and business layer protocol priority. Described below with reference to Figure 14 for example for scheduling, etc.
Business ahead reservation algorithm.
SAR and framer 606 resolution, sorting and framing data packets from the wireless medium used to
WAP 290d to wireless transceiver subscriber antenna 292 for wireless transmission. Is shown in block diagram 800
820a-820e plurality of user applications running on such user workstations 120d (not shown) of the apparatus,
The device is connected to a position in the CPE 306a-306e of the CPE station 294a-e (not shown).
Each position of the CPE 306 can hold one or more of the CPE station 294, each user
CPE station 294 can go to and from one or more user stations 120 to receive and transmit one or more
IP data stream. In fact, connected to a single CPE station for each application can receive or transmit more
IP data stream.
Referring to Figure 8A, the CPE location 306a, CPE SAR and framers 814a reorder received
The data flow through the CPE scheduler 816a and 818a CPE IP flow analyzer should be sent to the user
With 820a. CPE IP flow scheduler 816a-816e can perform downlink flow scheduler 604 for
Uplink traffic of the same functions. Similarly, CPE IP flow analyzer 818a-818e performs downlink
Link is the same functions stream analyzer 602.
In an embodiment of the present invention, in the downlink mode, CPE IP flow schedulers 816a-816e
And CPEIP stream analyzer 818a-818e does not perform functions.
800 illustrates a block diagram of a downlink path of the logic function, but these features are not
To a physical location.
User applications 820a-820e and CPE SAR and framer 814a-814e features can pass
Over a wireless connection to connect to a wireless base station 302 actual user CPE station 294 to perform.
800 lists downlink block diagram flow scheduler 604 an exemplary use of a set of priority
812, so that the received packet is placed in the priority-class queue. The following is a list of a group of
Priority Example: UDP latency sensitive priority 812a, high priority 812b, intermediate excellent
First stage 812c, the initial Hypertext Transfer Protocol (HTTP) priority mask 812d, moderate latency
Priority 812e, File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and its
Its email service priority and low priority 812f 812g. Skilled in the art will be agreed
Realized that the QoS requirements of the end user according to a number of different priority levels are possible. Waiting
A sensitive priority data, UDP is the data with the highest priority because it jitter (ie
Time synchronization is important) and latency (ie, reverse direction between IP traffic the amount of time elapsed) Spirit
Min. 812b is a high priority VPN services such as additional costs and high priority SLA operations. In
Priority 812c between numerical example is VPN service layer and the intermediate layer SLA business. HTTP excellent shielding
Level 812d is the first download HTTP data, such as the original HTTP shield, it is very important because it can
So that Internet users feel as if there is a lot of bandwidth available for Internet sessions. Wait Time Medium
The priority refers to the waiting time 812e medium such as email service data. FTP,
SMTP data includes priority 812f latency and jitter insensitivity but because the sizes to be transmitted
To a lot of bandwidth to accurately downloaded data. Finally, the low priority data is one that can 812g
Through a long data transfer, when a network device based on a 24-hour transfer status information
To another network device.
...
800 lists downlink block diagram flow scheduler 604 an exemplary use of a set of priority
812, so that the received packet is placed in the priority-class queue. The following is a list of a group of
Priority Example: UDP latency sensitive priority 812a, high priority 812b, intermediate excellent
First stage 812c, the initial Hypertext Transfer Protocol (HTTP) priority mask 812d, moderate latency
Priority 812e, File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and its
Its email service priority and low priority 812f 812g. Skilled in the art will be agreed
Realized that the QoS requirements of the end user according to a number of different priority levels are possible. Waiting
A sensitive priority data, UDP is the data with the highest priority because it jitter (ie
Time synchronization is important) and latency (ie, reverse direction between IP traffic the amount of time elapsed) Spirit
Min. 812b is a high priority VPN services such as additional costs and high priority SLA operations. In
Priority 812c between numerical example is VPN service layer and the intermediate layer SLA business. HTTP excellent shielding
Level 812d is the first download HTTP data, such as the original HTTP shield, it is very important because it can
So that Internet users feel as if there is a lot of bandwidth available for Internet sessions. Wait Time Medium
The priority refers to the waiting time 812e medium such as email service data. FTP,
SMTP data includes priority 812f latency and jitter insensitivity but because the sizes to be transmitted
To a lot of bandwidth to accurately downloaded data. Finally, the low priority data is one that can 812g
Through a long data transfer, when a network device based on a 24-hour transfer status information
To another network device.
...
Block diagram 830 includes an uplink stream analyzer 632, an uplink scheduler 634 and the flow
Uplink SAR and framer 636. These components are similar in function to the downlink flow analyzer
602, the downlink flow scheduler 604 and downlink SAR and framer 606, but the analysis, adjusting
Degree, sorting and framing data packets, the packet 294 from the CPE station user station 120 (in
User CPE location 306a-306e) via wireless transmission medium, and send the packet to the interface 320 is used to
Transmitted to the data network 142.
Figure 8B is a diagram showing user applications 820a-820e, which is the same as shown in Figure 8A Application
Which also shows CPE IP flow analyzer 819a-819e, CPEIP flow scheduler 817a-817e and CPE
SAR and framer 815a-815e. Functions of these components is similar to user applications 820a-820e,
CPE IP flow analyzer 818a-818e, CPE IP flow scheduler 816a-816e, and CPE SAR and
Framer 814a-814e. However, the function of these components in the uplink path analysis, scheduling
And send IP traffic from the CPE station (at the CPE location 306a-306e) to the wireless base station 302 with
Routing to the destination host at the workstation 136 (not shown).
It should be noted that multiple applications can be connected to the CPE a position 306a-306e
One or more of the CPE station. In order to prevent multiple applications for uplink communication contention fixed
Number of bandwidth allocation, in one embodiment of the present invention, the use of reserved scheduling system. Use for
Bandwidth allocation packet slots is called a frame, following in FIG 12A-12Q, 14,16 A and 16B described
Above.
830 illustrates a block diagram of an uplink path of the logic function, but these features are not
To a physical location.
For example, in one embodiment, the identification data for the uplink packet, feature presentation and stars
The IP class of the packet stream analyzer 632 analysis functions In a preferred embodiment, can occur in
User location 306a-306e of CPE subscriber stations 294a-294e (not shown) of the CPE IP flow analyzer
819a-819e in.
Moreover, in one embodiment, for scheduling uplink sub-frame slots CPE IP flow scheduler
Device 817a-817f functions can be performed in the wireless base station 302, so that each user CPE station 294 through
Over a wireless connection to connect to a wireless base station 302.
In this embodiment, the radio base station 302 scheduling uplink flow scheduler 634
Performed by the radio base station 302 on the uplink from the CPE station IP flow reservation request provided
For the classification of information. By placing all of the scheduling function in the radio base station 302, the system
Quality of service can be controlled to optimize the centralized scheduling.
In another embodiment, but their respective functions in the actual user CPE station
Execution.
In this embodiment, reservation scheduling function in allowing the uplink path and the interface 320
Communication prior to each use TDMA user CPE station fuselage reservation request block (RRB) request pre-
Left frame slot for uplink transmission lines below with reference to FIG 12A-12O further described. After reserving
Request, as shown in line 640, the uplink flow scheduler 634 CPE station 294 to the requesting user
Sending a description of one or more timeslots, CPE station 294 to use these slots from the source user station
120 through the wireless medium transmitting uplink data packet, the data points by the data network 142 mesh
The local host workstation 136.
C. Request business layer
Figure 9 illustrates PRIMMA MAC IP flow scheduler 604 in frame slot prioritization and scheduling
Resource allocation process of how to consider the business layer protocol; Figure 9 depicts the IP SLA regulate flow management chart
900, including the prioritization from the CPE user location 306a, 306b, 306c and 306d transferred to the non-
The radio base station 302, uplink traffic. For example, suppose the telecommunications business has been booked four users
SLA layer P1902a, P2904a, P3906a and P4908a one. In the illustrated example, the false
Let IP stream 902b is sent to the user at the CPE location 306a and the SLA has P1902a priority, etc.
Level. Similarly, IP stream 904b, 906b and 908b sent to the CPE position 306b, 306c and 306d
Users and respectively having P2904a, 906a and 908a of the SLA priority. The radio base station 302
The PRIMMA MAC scheduler 604,634 in the available bandwidth to the user CPE IP flow
902b, 904b, 906b and 908b will be considered during the SLA-based priority. In the illustrated example
Child in, IP stream 902b 902a according to the priority assigned SLA frame slot 902c. Frame slot 904c,
906c and 908c can also consider SLA priority scheduling. Then uplink IP flow business
Transmitted to the data network 142.
...
Figure 9 illustrates PRIMMA MAC IP flow scheduler 604 in frame slot prioritization and scheduling
Resource allocation process of how to consider the business layer protocol; Figure 9 depicts the IP SLA regulate flow management chart
900, including the prioritization from the CPE user location 306a, 306b, 306c and 306d transferred to the non-
The radio base station 302, uplink traffic. For example, suppose the telecommunications business has been booked four users
SLA layer P1902a, P2904a, P3906a and P4908a one. In the illustrated example, the false
Let IP stream 902b is sent to the user at the CPE location 306a and the SLA has P1902a priority, etc.
Level. Similarly, IP stream 904b, 906b and 908b sent to the CPE position 306b, 306c and 306d
Users and respectively having P2904a, 906a and 908a of the SLA priority. The radio base station 302
The PRIMMA MAC scheduler 604,634 in the available bandwidth to the user CPE IP flow
902b, 904b, 906b and 908b will be considered during the SLA-based priority. In the illustrated example
Child in, IP stream 902b 902a according to the priority assigned SLA frame slot 902c. Frame slot 904c,
906c and 908c can also consider SLA priority scheduling. Then uplink IP flow business
Transmitted to the data network 142.
...
d.'s first logo
Figure 7 illustrates the packet header information field 700, the information can be used to identify the IP flow and IP streams
QoS requirements. Specifically, IP header field 702 may include, for example, the source and destination IP addresses,
Helps to provide focus on the application of the priority allocation of resources; IP service types (TOS), to help PRIMMA
MAC or IP packet flow classification useful field; IP life cycle (TT1), is expected to application data
Packet discarding useful field;, and can be used to identify the IP stream protocol field.
Packet header information 700 also includes a UDP header field 704. Included in the UDP packet header
Portion of the field 704 is the source and destination port number.
Packet header information 700 also includes the TCP header field 706. Included in the TCP packet header
Unit field 706 is the source and destination port numbers; TCP sliding window size; urgent pointer;
SYN, ISN, PSH, RST and FIN flags; and the maximum segment size (MSS).
Packet header information 700 also includes a real time protocol RTP and RTCP header fields 708.
Skill in the art obviously other data packet header fields can also be used to identify
IP flow. This field has been given by way of example, and not of the useful field of the packet header exhaustive
Enumeration. Other fields, such as IPv6 services on the difference (DIFF SERV) of the field also
The wireless base station 302 can be an IP flow analyzer 602 and 632.
e.TDMA MAC air frame
Figure 12A-12O illustrate an exemplary time division multiple access (TDMA) medium access control (MAC)
Transport air frames. The fields described here is an embodiment of the present invention, the present invention is not
Multiple achieve restrictions.
Figure 12A illustrate air transport throughout the TDMA MAC frames. Air frame 1202 includes downlink transmission
Uplink subframe subframe 1202 and 1204.
Figure 12A is an uplink TDMA MAC frame includes air acknowledgment packet (UAB) 1206,
Confirmation request packet (ARB) 1208, frame descriptor packet (FDB) 1210, data slots
(DS)11212a,DS
21212b,DS
31212c,DS
41212d,DS
51212e,DS
61212f,
DS
71212g,DS
81212h,DS
91212i,DS
101212j,DS
111212k, DSm12121, down indeed
Put packet (DAB) 1214, reservation request packet (RRB) 1216, UA11218a,
UA
21218b,UA
31218c,UA
41218U,UA
51218e,UA
6121Sf,UA
71218g,
UA
81218h,UA
91218i,UA
101218j,UA
111218k,UA
1212181, and UA n1218m.
In the embodiment described here, using a TDMA type of TDMA / TDD
TDMA / TDD. In TDMA / TDD, for a time interval, a transfer from the CPE station
294 to the radio base station 302, at the time of another example, a transfer from the radio base station 302 to
CPE station 194. Plurality of time slots can be used for uplink or downlink. Number of slots is dynamically
Assigned to the uplink and downlink. However, because the downlink data rate is usually higher than the upstream
Link data rate, the more time slots allocated to the downlink. Although the downlink and uplink
Distribution between the link is dynamically assigned time slots, but the total number of slots of a frame in this embodiment
Is fixed.
...
In the embodiment described here, using a TDMA type of TDMA / TDD
TDMA / TDD. In TDMA / TDD, for a time interval, a transfer from the CPE station
294 to the
radio base station 302, at the time of another example, a transfer from the
radio base station 302 to
CPE station 194. Plurality of time slots can be used for uplink or downlink. Number of slots is dynamically
Assigned to the uplink and downlink. However, because the downlink data rate is usually higher than the upstream
Link data rate, the more time slots allocated to the downlink. Although the downlink and uplink
Distribution between the link is dynamically assigned time slots, but the total number of slots of a frame in this embodiment
Is fixed.
...
MAC empty
Air Frame
... | Slot | Packets /
Subframe | Name | Description |
0
|
1-8
| DAB / on
Row | Downstream confirmation
Request data
Package | CPE confirmation from the user station to a wireless base station
In the downlink subframe in the downlink access slot
Income |
0
|
1-8
| RRB / on
Row | Reservation requests
Packet | CPE-site request from a user at a later frame
Transmission reservation, contend with dynamic adjustable
Number of slots |
0
| Maximum
16 |
US
1-US
1
6/ Uplink | Uplink slot
Transmission | Uplink subframe data slots, each frame is
Variable (in one embodiment the maximum
16) |
0
|
1-3
| ODB / on
Row | Operational Data
Package | From the user, each frame consists of the CPE station
OA & MP data sorting |
0
|
0
| UAB / down
Row | Uplink confirmation
Packet | From the wireless base station to the CPE, the former
A sub-frame acknowledgment received uplink slot |
0
|
0
| ARB / down
Row | Confirmation request
Packet | The CPE requests the previous sub-frame is
Upon receipt of confirmation of reservation requests |
0
|
0
| FD / down | Current frame
Frame descriptor | Describe the contents of downlink subframes |
0
| Maximum
16 |
DS
1-DS
1
6/ Downstream | Downlink slot
Transmission | Downlink subframe data slots, each frame is
Variable (in one embodiment the maximum
16) |
0
|
0
| CCB / down
Row | Command and control
System packet | Each frame consists of the user to sort OA & MP command
And frame synchronization |
12B is an exemplary of the present invention, TDMA / TDD frame 1220 Symbols air.
TDMA / TDD frame structure 1220 described air frame size of 1228 frames, which may be for example 16
Slots or 32 slots. Skill in the art obviously may be used with other
Number of time slots of the frame structure 1220 without departing from the spirit or scope of the present invention. Frame structure 1220 includes
For example, various TDMA slot 1222a, 1222b, 1222c and 1222d. Each TDMA slot
1222a-c may include a data slot 1224a, 1224b, 1224c and 1224d, these slots may be
Respectively include control packets or packet 1226a 1226b-d.
In this embodiment, the frame size of the frame 1228 the total number of all of the TDMA slot 1222
Fixed. However, it is worth noting that, with the present invention, the resource allocation method, there may be
All the TDMA slot 1222, a sub-group is assigned to the uplink direction, the uplink where all
Link TDMA slots collectively referred to as uplink sub-frame or uplink transmission subframe 1204; and the whole
TDMA slot 1222 a sub-group of dynamically allocated to the downlink direction, in all downstream
Collectively link TDMA slot downlink sub-frame or downlink transmission subframe 1202. Use
The resource allocation method of the present invention, it is possible to assign all of the TDMA slot 1222 on a given
Line or downstream direction. There may be all the data slots allocated to a single CPE station 1224.
Wireless base station 302 has a state machine, and you know there are connected with each CPE station 294 is shaped
State (i.e., a radio base station 294 can identify the IP flow).
...
In this embodiment, the frame size of the frame 1228 the total number of all of the TDMA slot 1222
Fixed. However, it is worth noting that, with the present invention, the resource allocation method, there may be
All the TDMA slot 1222, a sub-group is assigned to the uplink direction, the uplink where all
Link TDMA slots collectively referred to as uplink sub-frame or uplink transmission subframe 1204; and the whole
TDMA slot 1222 a sub-group of dynamically allocated to the downlink direction, in all downstream
Collectively link TDMA slot downlink sub-frame or downlink transmission subframe 1202. Use
The resource allocation method of the present invention, it is possible to assign all of the TDMA slot 1222 on a given
Line or downstream direction. There may be all the data slots allocated to a single CPE station 1224.
Wireless base station 302 has a state machine, and you know there are connected with each CPE station 294 is shaped
State (i.e., a radio base station 294 can identify the IP flow).
...
1 downlink subframe
Figure 12C describes an exemplary downlink transmission subframe 1202. FIG. 12C downlink subframe
Round trip time includes a transmitter 1230, UAB1206, ARB31208, FDB1210, each frame variable
Number of DSs (e.g., 16) 1212, and command and control data packets (CCB) 1232. DS transmission 1212
Including DS 11212a,DS
21212b,DS
31212c,DS
41212d,DS
51212e,DS
61212f,
DS
71212g,DS
81212h,DS
91212i,DS
101212j,DS
111212k, and DS m12121.
Figure 12D downlink subframes 1202 describes exemplary UAB1206. Figure 12D downlink transfer
Input sub-frame includes UAB1206, ARB1208, FDB1210, DS 11212a,DS
21212b,
DS
31212c,DS
41212d,DS
51212e,DS
61212f,DS
71212g,DS
n1212h,
DS
91212i,DS
101212j,DS
111212k,DS
m12121, and CCB1232.
UAB UAB 1206 including sub-slot 11206a,UAB
21206b,UAB
31206c,
UAB
41206d,UAB
51206e,UAB
61206f,UAB
71206g, and UAB n1206h.
UAB
11206a contain a preamble 1234a, user ID1234b, IP flow identifier 1234c, slot along
No. 1234d and cyclic redundancy check (CRC) 1234e.
UAB field is a radio base station 302 to a CPE station 294 has received the uplink transmission sub-frame
Gap (for example, US1-US
16) Confirmation. Readers can refer to the following uplink subframe for discussion.
In the sub-slot UAB ARB 120611206a in: preamble 1234a includes full link
Objective data; User ID 1234b recognition make reservation requests CPE station 294; IP stream identifier
1234c identify the IP data stream; business data class quality 1234a recognize the priority of IP data stream,
If known to the CPE station 294; IP flow priority and type 1234b is a new IP data flow directions
Fu; and CRC 1234e, which represents the cyclic redundancy code, provides the RRB subslot 11216a erroneous
Bad check.
Figure 12E downlink subframes 1202 describes exemplary ARB 1208. Figure 12E downlink transmission
Input sub-frame includes UAB1206, ARB1208, FDB1210, DS 11212a,DS
21212b,
DS
31212c,DS
41212d,DS
51212e,DS
61212f,DS
7I212g,DS
n1212h,DS
91212i,
DS
101212j,DS
111212k,DS
m12121, and CCB1232.ARB1208 including sub-slot
ARB 11208a,ARB
21208b,ARB
31208c,ARB
41208d,ARB
51208e,
ARB
61208f,ARB
71208g, and ARB n1208h,ARB
11208a contain a preamble 1234a, with
Household ID1234b, IP flow identifier 1234c, slot sequence number 1234d, and cyclic redundancy check
(CRC) 1234e.
ARB field is a radio base station 302 to the CPE 294 has been received from the radio base station 302
CPE station 294 uplink reservation requests confirmation. Readers can refer to the following for upstream transmission subframe
Discussion.
ARB in ARB1208 sub-timeslot 11208a in: preamble 1234a includes full link
Objective data; User ID 1234b recognition make reservation requests CPE station 294; IP stream identifier
1234c identify the IP data stream; business data class quality 1234a recognize the priority of IP data stream,
If known to the CPE station 294; IP flow priority and type 1234b is a new IP data flow directions
Fu; and CRC 1234e, which represents the cyclic redundancy code, provides the RRB subslot 11216a erroneous
Bad check.
Figure 12F downlink subframes 1202 describes exemplary FDB 1210. Figure 12F downlink transmission
Input sub-frame includes UAB1206, ARB1208, FDB1210, DS 11212a,DS
21212b,
DS
31212c,DS
41212d,DS
51212e,DS
61212f,DS
71212g,DS
n1212h,
DS
91212i,DS
101212j,DS
111212k,DS
m12121, and CCB1232.
FDB including downlink subframe slots (for example, DS2-DS16) for more information.
FDB 1210 contain a preamble subslots 1236a, 1236b downlink slot subslot number, use
The uplink time slot reserved for a sub-1236c's IP flow ID, reserved for the uplink sub-slot 1236d 2 IP streaming
ID, for uplink reservation n subslot 1236e of the IP flow ID, and used in the next uplink subframe midnight
Gap 1236f contention slot count.
In the FDB 1210, the fields: the preamble are defined as sub-slot 1236a includes links
Complete data object; downlink slot number of sub-slot 1236b includes downlink slot (DSs) in
Number; for the downlink sub-slot reserved for the IP flow ID 1236c. DS1The IP flow identification; for the next
Line subslot 1236d reserved IP streaming ID includes the DS2The second IP flow identification; for downlink pre-
N subslot 1236e stay IP streaming ID includes the DSmAnother IP flow identification; used for the next
Uplink subframe subslot 1236f contention slot count to provide for the next available uplink subframe
Count.
Figure 12G description of an exemplary MAC payload data unit (PDU). Downlink MAC
PDU includes the physical structure on the payload information. Figure 12G downlink MAC PDU including
MAC list of links serial number 1238a (MAC serial number linked table), reservation requests marked quotes
1238b (the downlink IP flow indexing), compressed IP flow identifier 1238c, compressed IP stream priority
And type 1238d (identifying a compressed IP flow priority and type), slot payload 1238e (under
Data slot in the row of data) and CRC1234e (error checking information).
Figure 12H downlink subframes 1202 describes exemplary CCB. CCB includes Each frame consists of a
CPE station 294 sorted household OAM & P commands and frame synchronization. CCB 1232 including the mode command midnight
Gap 1240a (including selecting CPE station to take what model), before the command sub-slot 1240b (including
Specific system commands, such as a temporary circuit for use in a module), a control data slot labeled primers
1240c (including CPE station download the desired download location data and memory requirements or other information),
datab10ck1 subslot 1240d (including specific system data), datablock2 subslot
1240e (ibid.), datablock n subslots 1240f (ditto) and the CRC sub-slot 1234e (error
Proofreading information).
2 uplink subframe
Figure 12I uplink transmission sub-frame description of an exemplary uplink sub-frame 1204. Figure 12I of
Uplink sub-frame comprises a transmitter from the time 1230, DAB1214, RRB1216, each frame
A variable number of USs1218, such as 16, operating data packet (ODB) 1242, including from a user
For each frame by the user OAM & P data sorted. US transmission 1218 including US11218a,
US
21218b,US
31218c,US
41218d,US
51218e,US
61218f,US
71218g,
US
81218h,US
91218i,US
101218j,US
111218k,US
12, 12181, and US 131218m.
Figure 12K described uplink subframe 1204 and upstream transmission exemplary subframe RRB1216
1204. Figure 12K uplink sub-frame is also shown DAB1214, RRB1216, US11218a,
US
21218b,US
31218c,US
41218d,US
51218e,US
61218f,US
71218g,
US
81218h,US
91218i,US
101218j,US
111218k,US
1212181,US
n1218m, and
ODB1242.
RRB1216 including sub-slot RRB11216a,RRB
21216b,RRB
31216c,
RRB
41216d,RRB
51216e,RRB
61216f,RRB
71216g, and the RRB n1216h,
RRB
11216a contain a preamble 1234a, user ID1234b, IP flow identifier 1234c, business number
According to the level of quality 1244a, IP traffic priority and type 1244b, and CRC1234e.
RRB 1216 CPE station 294 using a sub-slot (RRB 11216a,RRB
21216b,
RRB
31216c,RRB
41216d,RRB
51216e,RRB
61216f,RRB
71216g, and
RRB n1216h) for reservation requests, it is the future CPE station 294 pairs of uplink transmission subframe
Bandwidth requests. If two attempts to access CPE station 294d 294e of the same sub-RRB 1216
Slot, this situation arises because they choose the same pseudo-random code generator sub-slot,
Appears "conflict", and the data can not be read by the radio base station 302. Two CPE station 294d,
294e need to retry.
Reservation requests based on IP flow slot can provide. In addition to the time slots assigned to each reservation request
A CPE subscriber station, the default number (e.g., 5) can be used for contention slots. If the conflict is more than
The number of slots reserved for the requesting user request is detected, the assigned time slots can be dynamically varied to
RRB additional slots. (Conflict similar to the Ethernet CSMA / CD conflict, in order to
Too Conflicting device online at a random time through and try to re-try the bus structure
Hair. )
Reservation request slots may be provided by an IP flow based. It is not a subscriber station for each CPE
Slot allocation reservation request, but there is a dispute be referred to as the default digital slot. If the probe
That a large number of measurements than the user request conflicts reserved slots, slots dynamically change the distributor
RRB slots to provide additionally. (Conflict conflict situations similar to Ethernet CSMA / CD, and then
The conflict over Ethernet device at any time will try to re-send via bus structure).
The wireless contention method is based on 1.Roberts in 1972 to develop the "time-division
A10ha "method, which is N.Abramson the early seventies of the nineteenth century, the development of" A10ha "
Bit mapping method and the so-called reservation protocol improvements. With time-division A10ha similar way, the
The present invention provides discrete time slots for transmission of data, rather than allowing the transmission of data at any point.
However, in addition to the actual data transmission "payload", the present invention is described in further easily send only real
Actual data payload content of reservation requests. Moreover, the number of slots for reservation requests may be square
It is based on the recent past conflicts detected frequency changed dynamically.
...
The wireless contention method is based on 1.Roberts in 1972 to develop the "time-division
A10ha "method, which is N.Abramson the early seventies of the nineteenth century, the development of" A10ha "
Bit mapping method and the so-called reservation protocol improvements. With time-division A10ha similar way, the
The present invention provides discrete time slots for transmission of data, rather than allowing the transmission of data at any point.
However, in addition to the actual data transmission "payload", the present invention is described in further easily send only real
Actual data payload content of reservation requests. Moreover, the number of slots for reservation requests may be square
It is based on the recent past conflicts detected frequency changed dynamically.
...
In addition to using bit-mapped protocol to resolve contention addition, as used in some reservation protocol, no
Line the base station can explicitly grant reservation requests. Standard bit mapping protocol requires that all stations can be connected
Received signals from all other stations, so the subsequent transmission sequence resulting bit map from
Format implicit OK. This method is advantageous not to receive from the other CPE subscriber stations 294d
Reservation request signal. This is advantageous because the higher frequency (for example, 2GHz to 30GHz),
There are sight and distance constraints, receiving from other CPE subscriber station 294d transmission requirements would unduly
Limit topology CPE subscriber station, the location and distance.
...
In addition to using bit-mapped protocol to resolve contention addition, as used in some reservation protocol, no
Line the base station can explicitly grant reservation requests. Standard bit mapping protocol requires that all stations can be connected
Received signals from all other stations, so the subsequent transmission sequence resulting bit map from
Format implicit OK. This method is advantageous not to receive from the other CPE subscriber stations 294d
Reservation request signal. This is advantageous because the higher frequency (for example, 2GHz to 30GHz),
There are sight and distance constraints, receiving from other CPE subscriber station 294d transmission requirements would unduly
Limit topology CPE subscriber station, the location and distance.
...
Notably, RRB 11216a includes the following fields: preamble 1234a, user ID
1234b, IP flow identifier 1234c, service quality data grade 1244a, IP priority and type of traffic
1244b, and CRC 1234e. In subslot RRB RRB 121611216a in: preamble 1234a
Includes data used for link integrity purposes; user ID 1234b make reservation requests identification CPE
Station 294; IP flow identifier 1234c identify the IP data stream; business data quality grade 1234a identify the IP
Priority data stream, if CPE station 294 know it; IP traffic priority and type 1234b
Is an indicator of the new IP data flow; CRC 1234e, which represents the cyclic redundancy code, provides subslot
On the RRB1Error checking 1216a. Alternatively, the subslot RRB 11216a provides additional
The field, which comprises at its IP data stream transmitted packet number of CPE station 294.
Figure 12K uplink subframe 1204 describes exemplary DAB 1214, revenue is recognized in this CPE
Time slot from the base station. DAB station from the CPE 294 to the wireless base station has a previous
Subframe received downlink slot confirmation.
DAB1214 including sub-slot DAB11214a,DAB
21214b,DAB
31214c,
DAB
41214d,DAB
51214e,DAB
61214f,DAB
71214g, and DABn1214h. Subslots
DAB11214a contain a preamble 1234a, user ID1234b, IP flow identifier 1234c, slot along
No. 1234d and cyclic redundancy check (CRC) 1234e. (These fields have the RRB said phase
The same information. )
Figure 121 describes a MACPDU exemplary uplink slot. Figure 121 MACPDU uplink
Slot contains a list of serial numbers 1246 CPE links, reservation request header quotes 1236b, IP streaming compression standard
Identifier 1238c, compressed IP flow priority and type 1238d, 1238e slot payload and CRC
1234e. Similar uplink downlink MAC PDU MAC PDU, but effective for the uplink sub-frame
Load information.
Figure 12M, 12N and 12O detailed description of an exemplary ODB 1242. This field is used to store
On the wireless base station 302 and the CPE station 294 is connected between the information. ODB 1242 contain a preamble
1234a (including full data link), the user ID 1234b (identify which CPE station 294 to make reservation
Request), the system state 1248a (294 on the status of the CPE station), performance data 1248b (buffer
Impulse control statistics, processor performance statistics, system state is full of status), Antenna 1248c (Off
The antenna information), CRC 1234e (error checking information) and synchronization pattern 1248d (error checking
Information).
Referring to Figure 12M, the system state including the system state subslot 1248a 1250a (CPE station mode
Type, for example, command mode, operating mode, or the system's initial mode), system status 1250b (CPE
Station status), system resources, 1250a (CPE station mode) System Power 1250b (CPE station module
Type), system temperature, 1250a (CPE station temperature). CPE station 294 needs to take turns using the ODB 1242
Transmit their information.
See Figure 12N, performance data, including repeated communication attempts 1252a 1248a number (repeat-pass
The number of attempts letter), the frame omission 1252b (already dropout frames), wait state indexing 1252c (such as
Pending state indexing).
f. exemplary level of frame-based prioritization
Figure 13 shows a block diagram 1300 of the present invention an exemplary flow of production scheduler to schedule
Thereof. Block Diagram 1300 include: flow scheduler 604,634 (which is the downlink flow scheduler 604 and
Uplink flow scheduler 634 combinations), the downlink transmission subframe 1202 (ie, the next MAC
Extended sub-frame), an uplink transmission subframe 1204 (ie, the current MAC uplink subframe). Block Diagram 1300
Downstream component also includes the following: Downstream reserved FIFO queue 1322,1 level downstream queue
1302,2 downstream queue class 3 downstream queue 1304 and 1306. Further comprising the block diagram 1300
Uplink earmarked components: the current uplink subframe 1344 (current uplink subframe about 1204 stored in its
In), the previous level uplink uplink subframe 1346,1348,1350,1 reservation request queue 1308,2
Level upstream reservation request queue 1310 and three uplink reservation request queue 1312.
...
Figure 13 shows a block diagram 1300 of the present invention an exemplary flow of production scheduler to schedule
Thereof. Block Diagram 1300 include: flow scheduler 604,634 (which is the downlink flow scheduler 604 and
Uplink flow scheduler 634 combinations), the downlink transmission subframe 1202 (ie, the next MAC
Extended sub-frame), an uplink transmission subframe 1204 (ie, the current MAC uplink subframe). Block Diagram 1300
Downstream component also includes the following: Downstream reserved FIFO queue 1322,1 level downstream queue
1302,2 downstream queue class 3 downstream queue 1304 and 1306. Further comprising the block diagram 1300
Uplink earmarked components: the current uplink subframe 1344 (current uplink subframe about 1204 stored in its
In), the previous level uplink uplink subframe 1346,1348,1350,1 reservation request queue 1308,2
Level upstream reservation request queue 1310 and three uplink reservation request queue 1312.
...
According from the priority based on multi-level input processor, virtual private network (VPN) enabled
Directory (DEN) data sheets and business layer Agreement (SLA) priority data table (see Fig. 15A below
And 15B described separately), 1, 2, and 3, respectively, queue the packet flow downstream assigned to a team
Column 1302,2 level downstream queue 1304 and three downstream queue 1306. Flow Scheduler 604,634
In the downlink transmission subframe 1202 schedule the downlink data packets.
According from the priority based on multi-level input processor, virtual private network (VPN) enabled
Directory (DEN) data sheets and business layer Agreement (SLA) priority data table (see Fig. 15A below
And 15B described separately), 1, 2, and 3, respectively, queue the packet flow downstream assigned to a team
Column 1302,2 level downstream queue 1304 and three downstream queue 1306. Flow Scheduler 604,634
In the downlink transmission subframe 1202 schedule the downlink data packets....
In the uplink, uplink time slots reserved for future requests as CPE subscriber station 294 through
The current received over the wireless medium uplink subframe portion 1204 reach the radio base station 302. Current
1344 uplink subframe may temporarily store reservation request for the above described analysis of Figure 8B
Scheduling uplink data packet. 1346,1348,1350 previous uplink sub-frame includes an upward Reserved
Request pending in the future uplink subframe 1204 uplink frame slot allocation. Reservation request packet
(RRBs), further reference to Figure 12 above,***The sounds, including having the IP flow identifier #, and
Single IP stream flow levels requested more time slots. Uplink reservation requests (by the IP flow and level) by the IP
Flow QoS class queuing processor (by reference to Figures 16A and 16B described below) to an upstream line
Reservation request queue 1308,2 level upstream reservation request queue 1310 and three uplink reservation request queue
1312. Flow scheduler 604 and 1566,634 and 1666 use these downlink and uplink reservation please reserved
Were seeking to transfer next click OK uplink subframe subframe 1202 and 1204 data
Package allocated time slot.
Figure 14 is ahead of the reservation algorithm block diagram of an exemplary two-dimensional 1400. Figure 14 includes the MAC sub-
Frame Scheduler 1566,1666, n1402 current frame and future frame n +11404, n +21406, n +31408,
n +41410, n +51412, n +61414 ... n + x1416, that at time n, n +1, n +2 ... n + x to
Transmitted packet frame. Each frame is divided into a variable-length downlink subframe 1202 and variable-length
1204 uplink subframe. 1202 downlink subframe and an uplink sub-frame length of 1204 a
Constitute the entire length of the frame from.
Each frame n 1402 includes a plurality of slots (1418-1478). 1418-1446 includes a downlink slot
Subframe 1202, 1448-1478 slot 1204 includes an uplink sub-frame. In one embodiment, the time
Gap length is fixed, each slot can store a single packet. A total number of slots in the frame to maintain
Constant. For example, if a given frame comprises the frame slots 64, the slots may be in the uplink or
Dynamically allocated downlink direction, such as 32 and 32, the 64 and 0, the 0 and 64 on the lower. Square
Diagram 1400 can be considered a two-dimensional matrix, each slot has a time value (i.e., time slot - Slot
Time interval), for example 0.01ms, each frame has a total frame time interval value (i.e., frame - frame
Interval), for example, 0.5ms.
...
In the present invention, lead to the reservation algorithm based on the IP data packet stream on the priority
Level for the data packet is assigned in the future time slot. The priority has been exemplary in the above with reference to FIG. 8A, respectively,
And 8B described. Calls for jitter sensitive, which means that the call for time sensitive, it is important
Is to maintain the like (i.e., on-time phase) connection. With this signal is important that data
Spread to the same time slot between frames, or in a periodic change between frames in the time slot. For example,
Vertical Reserved 1480 shows each frame to receive the same downlink communication signal time slot jitter sensitive.
In particular, the signal is assigned a slot in the frame 1402-1416 1422. If the frame and the frame time interval
Is 0.5ms, 0.5ms then the slot will be provided to each IP flow. As another example, slash reserved 1482
As the sequence represents a periodic variation between frames to jitter sensitive signal reception slot. Specific
Said signal allocated slot 1440 in the frame 1402, the time slot in the frame 1438 1426 1404 ... time slot in the frame
1416, to generate a "slash." If the frame and the frame time interval is 0.5ms, the time slot to time slot
Interval is 0.01ms, the slots may be a less per 0.5 to 0.01 equivalent 0.49mms IP flow.
Therefore, to reduce the frame interval can be reserved with a positive slope slash. In order to obtain incremental
Frame interval, the negative slope of the slash, slash such negative slope uplink reserved 1486. Pre-slash
1482 can also be left in the order according to the desired period between frames and more significant (i.e., the use of larger or
Smaller slope). Reservation Mode 1480,1482,1484 and 1486 are sensitive to jitter communication
Useful model. Also shows the vertical reserved 1486 reserved 1480 similar to the vertical, the uplink
Direction jitter sensitive traffic helpful.
...
In the present invention, lead to the reservation algorithm based on the IP data packet stream on the priority
Level for the data packet is assigned in the future time slot. The priority has been exemplary in the above with reference to FIG. 8A, respectively,
And 8B described. Calls for jitter sensitive, which means that the call for time sensitive, it is important
Is to maintain the like (i.e., on-time phase) connection. With this signal is important that data
Spread to the same time slot between frames, or in a periodic change between frames in the time slot. For example,
Vertical Reserved 1480 shows each frame to receive the same downlink communication signal time slot jitter sensitive.
In particular, the signal is assigned a slot in the frame 1402-1416 1422. If the frame and the frame time interval
Is 0.5ms, 0.5ms then the slot will be provided to each IP flow. As another example, slash reserved 1482
As the sequence represents a periodic variation between frames to jitter sensitive signal reception slot. Specific
Said signal allocated slot 1440 in the frame 1402, the time slot in the frame 1438 1426 1404 ... time slot in the frame
1416, to generate a "slash." If the frame and the frame time interval is 0.5ms, the time slot to time slot
Interval is 0.01ms, the slots may be a less per 0.5 to 0.01 equivalent 0.49mms IP flow.
Therefore, to reduce the frame interval can be reserved with a positive slope slash. In order to obtain incremental
Frame interval, the negative slope of the slash, slash such negative slope uplink reserved 1486. Pre-slash
1482 can also be left in the order according to the desired period between frames and more significant (i.e., the use of larger or
Smaller slope). Reservation Mode 1480,1482,1484 and 1486 are sensitive to jitter communication
Useful model. Also shows the vertical reserved 1486 reserved 1480 similar to the vertical, the uplink
Direction jitter sensitive traffic helpful.
...
Less sensitive to the waiting time for a call, the communication is assigned for less time per frame
Clearance. For example, the communication waiting time can be less sensitive to accept every four to ensure a slot
Bandwidth. On the waiting time is more insensitive every ten calls can receive a single time slot.
Less sensitive to the waiting time for a call, the communication is assigned for less time per frame
Clearance. For example, the communication waiting time can be less sensitive to accept every four to ensure a slot
Bandwidth. On the waiting time is more insensitive every ten calls can receive a single time slot....
Less sensitive to the waiting time for a call, the communication is assigned for less time per frame
Clearance. For example, the communication waiting time can be less sensitive to accept every four to ensure a slot
Bandwidth. On the waiting time is more insensitive every ten calls can receive a single time slot....
1 Overview
15A and 15B are in the downlink direction, and scheduling of an exemplary wireless bandwidth sharing
Logic flow. Logic flow is reached from the data network 140 wireless base station 302 IP packet stream,
Down through the wireless medium for transmission to a subscriber CPE station 294d. 15A is used for downlink
IP Analyzer 602 exemplary logic flow 1500. 15B is for downlink flow scheduler
An exemplary logic flow diagram 604 1560.
Figures 15A and 15B explain the functional components of the module via the method, they can be regarded as physical
Unit (e.g., including software, hardware, or a combination thereof) or logical vehicles (e.g., only for explanatory
Purpose). Skilled in the art will recognize that these modules only for explaining the exemplary embodiment
Cases, not be regarded as limiting.
Figure 15A is used for the downlink IP flow analyzer of an exemplary logic flow diagram 1500 includes a number of
According to the packet header identification component 1502, packet feature presentation component 1504, packet classification section
1506 and 1508 IP streaming components present. These components function explained in detail below.
In one embodiment, the downlink IP flow analyzer 602 is physically located in the radio base station
302, but the skilled person will recognize that the same functionality can be located far from the radio base station
302 places.
Figure 2D, 3A and 3B will help the reader understand the downlink IP flow analyzer.
2 Introduction
IP flow analyzer 602 to the downlink frame scheduler 604 execute the recognition, feature presentation, classification,
Render the data packet functions. Recognition, feature presentation, classification and presentation of the data packets functions are
IP flow analyzer 602 downlink data packet header identification component 1502, packet characteristic representation
Part 1504, packet classification component 1506 and IP flow presentation component 1508 executed.
Identify the part of the pack header 1502 header portion of the data packet to determine the input contents of the field
IP data stream into a data packet is the IP stream known to the system or a new part of the IP data stream
The first packet. The packet header identification component 1502 can also make use of the contents of the packet header fields
Identify the packet source. Packet characteristic feature representation expressed Parts 1504 new packet (belonging
The new IP data flow) to determine the QoS requirements of IP data stream, and the identification number that will receive the IP
Data stream associated with the user workstation user CPE station. Packet classification unit 1506 will be a new IP
The communication data stream classification priority, the packet with similar types of IP flows are grouped together.
IP data stream presentation section 1508 Initializes a new IP data streams and present it to the downlink flow adjustment
604 degrees.
...
Identify the part of the pack header 1502 header portion of the data packet to determine the input contents of the field
IP data stream into a data packet is the IP stream known to the system or a new part of the IP data stream
The first packet. The packet header identification component 1502 can also make use of the contents of the packet header fields
Identify the packet source. Packet characteristic feature representation expressed Parts 1504 new packet (belonging
The new IP data flow) to determine the QoS requirements of IP data stream, and the identification number that will receive the IP
Data stream associated with the user workstation user CPE station. Packet classification unit 1506 will be a new IP
The communication data stream classification priority, the packet with similar types of IP flows are grouped together.
IP data stream presentation section 1508 Initializes a new IP data streams and present it to the downlink flow adjustment
604 degrees.
...
3 Identify
The packet header identification component 1502 identifies the data interface 320 from the header of the data packet number
According to the network 142 receives the IP stream.
IP network 142 from the data stream packets from various IP flow stream includes data packets (in this case each
An IP flow and a single data "call" on) in the data packet header identifies the receiving member 1502. IP flow can
To include the packed data, which includes any type of digital information, such as packaging of voice, video,
Audio, data, IP streaming, VPN streaming and live streaming. IP flow data network 142 via the host workers from such
Workstation 136d transmission and reach 320 wireless base station interface 302. Interface 302 transmit IP data stream
Packet to the packet header identification component 1502. In the module 1510, received packet buffer into memory
Storage area. In block 1520, a packet extracting and parsing the contents of the header field.
...
IP network 142 from the data stream packets from various IP flow stream includes data packets (in this case each
An IP flow and a single data "call" on) in the data packet header identifies the receiving member 1502. IP flow can
To include the packed data, which includes any type of digital information, such as packaging of voice, video,
Audio, data, IP streaming, VPN streaming and live streaming. IP flow data network 142 via the host workers from such
Workstation 136d transmission and reach 320 wireless base station interface 302. Interface 302 transmit IP data stream
Packet to the packet header identification component 1502. In the module 1510, received packet buffer into memory
Storage area. In block 1520, a packet extracting and parsing the contents of the header field.
...
If not, which means that the IP flow is a new IP data flow, control transferred to the module 1524,
In this analysis, the data packet header fields. Module 1524 analyzes the source packet header field and from the source
Application packet header data sheet to make sure the data call 1528 or send an IP packet source
Type of application. Application may be any one described with reference to FIG. 2D or technician in the field known to
Application. Examples include from another client workstation 138f download File Transfer Protocol (FTP), IP
Voice telephone calls (via telephone gateway 288b), 124d from the caller's voice phone calls (via
Over a modem connection), from the host workstation 136a connected LAN128a's e-mail
Parts, fax calls, and from multiple callers 124d and 126d (through a modem) for
Conference calls, and so on. If the system does not know the IP stream, the IP flow identification number given IP flow,
Control passes to block 1526, where IP flow identification number to an existing IP flow identification table 1526.
...
If not, which means that the IP flow is a new IP data flow, control transferred to the module 1524,
In this analysis, the data packet header fields. Module 1524 analyzes the source packet header field and from the source
Application packet header data sheet to make sure the data call 1528 or send an IP packet source
Type of application. Application may be any one described with reference to FIG. 2D or technician in the field known to
Application. Examples include from another client workstation 138f download File Transfer Protocol (FTP), IP
Voice telephone calls (via telephone gateway 288b), 124d from the caller's voice phone calls (via
Over a modem connection), from the host workstation 136a connected LAN128a's e-mail
Parts, fax calls, and from multiple callers 124d and 126d (through a modem) for
Conference calls, and so on. If the system does not know the IP stream, the IP flow identification number given IP flow,
Control passes to block 1526, where IP flow identification number to an existing IP flow identification table 1526.
...
4 feature representation
Packet characteristic feature representation Parts 1504 expressed the new IP stream and sent to the packet classification
Part 1506 for classification.
For an existing IP flow, control from the packet header identification component 1502 and transmission module 1522
To the module 1530. If the block 1522 determines IP data stream has been known to the system, then the module
1530 determines whether the packet is old (ie, stale). This may include, for example from the survival time
Field (IP packet header fields) that the packet is life and comparing the threshold field and the life of
Values. If the packet is determined to be stale, then give up. According to the life of the packet can be expected
Customer applications obsolete. Otherwise, control can be transferred to the packet classification part 1506 module 1540.
For a new IP flow, control from the packet header identification component 1502 and transmission module 1524
To the module 1532. If the module 1524 to determine the IP stream is not known to the system, then the module 1532
Modules 1524 and 1528 using the resource identified in the application information to determine QoS requirements of the application.
Module 1532 through 1534 in the lookup table QoS requirements have been identified for the source application QoS requirements
Perform this operation. Qos of different applications have different requirements in order to provide an acceptable end-user
Experiences. For example, the bandwidth allocation (ie, allocating appropriate amount of bandwidth) under the implementation of FTP file transfer
The application contains very important, no jitter (ie, the time synchronization of data is received) and latency (ie, ring
Should amount of time between). On the other hand, jitter and latency for voice calls and conference calls is
Important and bandwidth allocation is not important.
...
For a new IP flow, control from the packet header identification component 1502 and transmission module 1524
To the module 1532. If the module 1524 to determine the IP stream is not known to the system, then the module 1532
Modules 1524 and 1528 using the resource identified in the application information to determine QoS requirements of the application.
Module 1532 through 1534 in the lookup table QoS requirements have been identified for the source application QoS requirements
Perform this operation. Qos of different applications have different requirements in order to provide an acceptable end-user
Experiences. For example, the bandwidth allocation (ie, allocating appropriate amount of bandwidth) under the implementation of FTP file transfer
The application contains very important, no jitter (ie, the time synchronization of data is received) and latency (ie, ring
Should amount of time between). On the other hand, jitter and latency for voice calls and conference calls is
Important and bandwidth allocation is not important.
...
5 Classification
Packet classification component 1506 and IP flow classification to the IP flow presentation component 1508 pairs
In rendering.
For an existing IP flow, control member from the packet characteristic representation module 1530 transmission 1504
To the module 1540. If the module 1530 determines that the packet is not stale, then in 1540 the module
Data packets associated with an existing IP flow. Shown in Figure 15A, where the processed data packets determined to be the
Known to the system as part of IP flows. Therefore, the module 1532,1536 and 1542 QoS processing is
Unnecessary, because the QoS requirements of the data packet to its IP flow assumptions and the same In another
Embodiment, all data packets are characteristic representation and classification. 1540 from the module, the control can continue
1508 continued to show IP flow module 1546.
For the new IP flow, control member from the packet characteristic representation module 1536 to the 1504
Module 1542. In the module 1542 via IP flow QoS class table lookup table module 1544 the number of
According to the QoS level packet classification, QoS levels in this type of data packets based on the QoS requirements of storage.
Similar IP flow, (i.e. with similar IP flow QoS requirements) are grouped together in the module 1542. In the sub-
Class packets and IP flows, QoS class grouping, any Diffserv priority tagging and any TOS
Priority tagging can be considered. From the module 1542, control passes to the IP flow presentation component 1508
Module 1548.
6.IP flow presents
IP flow presentation component 1508 preparation and the downlink flow scheduler 604 IP stream data presented
Package.
For an existing IP flow, control member 1540 from the packet classification module 1540 to the mold
Block 1546. In block 1546, the packet added to the relevant existing IP flow queue, which is the current IP flows
Queues. From block 1546, control passes to the downlink flow scheduler 604 IP flow QoS class
Queuing processor module 1562.
For the new IP flow, control from the packet classification part 1506 is sent to the module 1542 module
1548. In the module 1548 can be used to initialize a new IP stream presented to the module 1552. In the module
1550, IP flow QoS class scheduler presented to the frame 604 to an appropriate level in order to place the queue. Mold
Block 1552 to the downlink flow scheduler 604 IP flow QoS class queuing processor module 1562 mention
For the IP flow (particularly the data packets), and IP flow identifier.
7 downlink flow scheduler
Figure 15B is used for the downlink flow scheduler 604 includes an exemplary logic flow diagram 1560
IP flow QoS class queuing processor module 1562, MAC downlink subframe scheduler module
1566, based on multi-level priority processor module 1574, VPNDEN data table module 1572,
SLA priority data table 1570, CPE IP flow queue depth status processor 1582 and the link layer does
Recognition processor module 1578.
Figure 15B is a downlink flow scheduler 604 also includes QoS class queue as follows: 1,
1564a; 2 级, 1564b; 3 级, 1564c; 4 级, 1564d; 5 级, 1564e; and 6,
1564f; and MAC downlink sub-frame: frame n, 1568a; frame n +1,1568 b; frame n +2,1568 c;
Frame n +3,1568 d; ... frame n + p, 1568k.
In one embodiment, the downlink flow scheduler 604 is physically located in the radio base station
302, but the skilled person will recognize that the same functionality can be located far from the radio base station
302 places.
Downlink flow scheduler 604 for scheduling downlink subframe. With the entire frame can be divided into
Transmitting uplink frames in the uplink portion (called an uplink subframe) for transmitting downlink
Downlink link frame portion (called a downlink subframe).
Figure 15B also shows WAP antenna, wireless media, 290d, RF transceiver subscriber antenna
292d, 294d user CPE station and user workstations 120d. WAP antenna 290d and RF transceiver
User wireless base station antenna 292d respectively 302 (in this downlink scheduler 604 in a stream
Embodiment) and the CPE station 294d between the wireless connection, which the user can send IP flow
Applications running on the workstation 120d. WAP acts as an antenna 290d 142 wireless data network gateway,
RF transceiver subscriber antenna acts as the CPE station 294d wireless gateway. The connection also Figure 2D
And 3B is shown. IP flow QoS class queuing processor module 1562 receives presents from the IP stream components
1508 packets. Module 1562 generates class queue 1564a-1564f, which is a variable number of
Queue the packet and placed in the queues in these levels. Through the module 1562 to determine the number of input
It is placed on the level of how packets queue 1564a-1564f.
...
Figure 15B also shows WAP antenna, wireless media, 290d, RF transceiver subscriber antenna
292d, 294d user CPE station and user workstations 120d. WAP antenna 290d and RF transceiver
User wireless base station antenna 292d respectively 302 (in this downlink scheduler 604 in a stream
Embodiment) and the CPE station 294d between the wireless connection, which the user can send IP flow
Applications running on the workstation 120d. WAP acts as an antenna 290d 142 wireless data network gateway,
RF transceiver subscriber antenna acts as the CPE station 294d wireless gateway. The connection also Figure 2D
And 3B is shown. IP flow QoS class queuing processor module 1562 receives presents from the IP stream components
1508 packets. Module 1562 generates class queue 1564a-1564f, which is a variable number of
Queue the packet and placed in the queues in these levels. Through the module 1562 to determine the number of input
It is placed on the level of how packets queue 1564a-1564f.
...
SLA priority data table 1570 can take advantage of customer-specific business layer protocol intended to shadow
Ring queuing feature. Customers can be provided higher quality telecommunications services, for example by paying additional
Money in order to receive this additional cost business. An algorithm running in the module 1562 can be increased to the
These customers queuing priority messages.
SLA priority data table 1570 can take advantage of customer-specific business layer protocol intended to shadow
Ring queuing feature. Customers can be provided higher quality telecommunications services, for example by paying additional
Money in order to receive this additional cost business. An algorithm running in the module 1562 can be increased to the
These customers queuing priority messages....
SLA priority data table 1570 and VPN DEN data table 1572 received from the operation, the tube
Manage, maintain and supply (OAM & P) module 1108 inputs. This is where the line of modules including
Correction on the new store and manage customer information or updates on existing customers. Case
For example, the customer's SLA priority and VPN information from OAM & P module 1108 updates.
Based on multi-level priority processor module 1574 is in principle based on multi-level queuing operated under
For the module. Based on multi-level queuing and VanJacobson established by the Sa11yF10yd, they are considered
The designers of the Internet early.
Queuing based on multi-level access device using edge router IP flow classification tree
Different types. Each branch of the tree symbolize different levels of IP flows, each dedicated to a set level
A limited amount of bandwidth. In this way, different levels of flow of the guaranteed minimum bandwidth, is
On a single IP data stream and a single IP flow level are unable to use all of the available bandwidth.
The present invention utilizes the concept of multi-level queue prioritization features added to make excellent grades based
The first stage is implemented aside, as explained above with reference to Figures 13 and 14 discussed.
MAC downlink subframe scheduler 1566 in class queue 1564a-1564f number of queued
According to the packet processor module, and according to priority 1570,1572 and 1574 in the frame slot reserved
Fill subframe 1568a-1568k, which is a variable number of frames. In one embodiment, each sub-frame according to
Priority 1570,1572 and 1574 from each grade 1564a-1564f scheduling (filling) until a predetermined
Number of data packets. In another embodiment, with reference to Figures 13 and 14 according to the invention described
Advance reservation algorithm for scheduling sub-frame, etc. set aside. In another embodiment, according to the known process
Law and the present invention is a combination of methods advance reservation algorithm scheduling sub-frame.
Sub-frames are then sent to the WAP antenna 290d, for wireless transmission via the wireless medium to the use
Households connected CPE station 294d RF transceiver subscriber antenna 292d, WAP antenna 290d package can be
Contained in the sub-frame packet is sent to the CPE subscriber location 306d user station 120d. Child
Frame from the highest priority to lowest priority scheduling.
Based on Multi-level priority (HCBP) processor module 1574 receives call from a WAP antenna 290d
Degree and transmission sub-frame input. By maintaining the state of understanding of the data packets (i.e., by that which
Packet has been sent), HCBP processor module 1574 that must schedule class queue
1564a-1564f which data packets.
Occasionally, the data packets will be lost by, for example noise. When this situation occurs, the CPE
Station 294d retransmission request is sent to the WAP290d 1576, it sent a request to confirm the link layer (ARQ)
Processor 1578. MAC ARQ processor 1578 notification downlink subframe scheduler 1566 this situation
Shaped, scheduler 1566 rescheduling from the appropriate class queue 1564a-1564f request packet with
For retransmission. Link layer ARQ processor 1578 also waiting for confirmation from the user CPE station 294d affirmation
Confirmation to determine packet has been received correctly. Certainly received only after receiving confirmation,
MAC downlink subframe scheduler 1566 only from the class queue 1564a-1564f delete the data
Package.
Each user CPE station 294d has a limited amount of memory available to receive IP data stream
Package. For example, when connected to the CPE station 294d (for example, a user workstation 120d) of the device stops
Receive IP data stream (e.g., the user station 120d falling), CPE CPE subscriber station 294d in
Packet queue will quickly fill up. In this scenario, the user CPE station 294d sending CPE IP flow team
Column indicates the depth of the message queue fills 1580, the message flow queue depth by the state Department CPEIP
Processor 1582 receives. CPE MAC notification queue depth processor 1582 downlink subframe scheduler
1566 this case, the scheduler 1566 to stop pointing the CPE station 294d scheduling downlink subframe.
Processor 1582 can also send messages to MAC downlink subframe scheduler 1566 to refresh the
Since the class queue 1564a-1564f special IP flow.
...
Each user CPE station 294d has a limited amount of memory available to receive IP data stream
Package. For example, when connected to the CPE station 294d (for example, a user workstation 120d) of the device stops
Receive IP data stream (e.g., the user station 120d falling), CPE CPE subscriber station 294d in
Packet queue will quickly fill up. In this scenario, the user CPE station 294d sending CPE IP flow team
Column indicates the depth of the message queue fills 1580, the message flow queue depth by the state Department CPEIP
Processor 1582 receives. CPE MAC notification queue depth processor 1582 downlink subframe scheduler
1566 this case, the scheduler 1566 to stop pointing the CPE station 294d scheduling downlink subframe.
Processor 1582 can also send messages to MAC downlink subframe scheduler 1566 to refresh the
Since the class queue 1564a-1564f special IP flow.
...
1 Overview
16A and 16B are exemplary for uplink logic flow. The logic flow is
IP packet analysis and scheduling of the shared wireless bandwidth stream, from the connection to the user of a CPE station 294d
User station to a user station 120d 294d, through the wireless transmission medium until the radio base station 302,
And direct access to the data network 142 for transmission to the destination host workstation 136a. 16A is used for the uplink
IP flow analyzer 632 links exemplary logic flow diagram 1600. 16B is used for uplink traffic
The scheduler 634 of an exemplary logic flow diagram 1660.
16A and 16B by way of functional components modules explanation, they can be regarded as a physical
Unit (e.g., including software, hardware, or a combination thereof) or logical vehicles (e.g., only for explanatory
Purpose). Skilled in the art will recognize that these modules only for explaining the exemplary embodiment
Cases, not be regarded as limiting.
Figure 16A for uplink IP flow analyzer 632 is an exemplary logic flow diagram 1600 package
Including the identification member of the pack header 1602, a packet characteristic representation component 1604, packet classification unit
Parts 1606 and 1608 IP streaming components present. These components function explained in detail below.
In one embodiment, the uplink IP flow analyzer 632 is physically located in the radio base station
302, but the skilled person will recognize that the same functionality can be located far from the radio base station
302 places. In the present preferred embodiment of the invention, IP stream analyzer 632 functions in the CPE
Station 294d perform required for uplink data packets / IP stream reserved uplink time slots until the group
Station 302. Reservation request packets (RRB) request details the IP flow identifier, the number of packets and IP
Stream classification can be established by the IP flow analyzer 632, preferably by using a contention slots in the uplink RRB
Link for the radio base station 302 by the uplink frame scheduler 634 uplink scheduling future
Subframe slots.
...
In one embodiment, the uplink IP flow analyzer 632 is physically located in the radio base station
302, but the skilled person will recognize that the same functionality can be located far from the radio base station
302 places. In the present preferred embodiment of the invention, IP stream analyzer 632 functions in the CPE
Station 294d perform required for uplink data packets / IP stream reserved uplink time slots until the group
Station 302. Reservation request packets (RRB) request details the IP flow identifier, the number of packets and IP
Stream classification can be established by the IP flow analyzer 632, preferably by using a contention slots in the uplink RRB
Link for the radio base station 302 by the uplink frame scheduler 634 uplink scheduling future
Subframe slots.
...
2 Introduction
IP flow analyzer 632 to an uplink frame scheduler 634 perform recognition, feature representations, of
Class, showing the function of the packet. The recognition, feature representations, packet classification and rendering functionality
Can respectively uplink IP flow analyzer 632 which identifies the packet header part 1602, a packet
Features representation member 1604, packet classification component 1606 and IP flow presentation component 1608 executed.
Packet header identification component 1602 to determine the input IP packet stream is known for the system
(I.e., whether the existing IP flow) or whether it is a new IP data stream of the first data packet, and
According to the data portion of the packet header field identifies the source application. Identification number 1602 may include a buffer
According to the package and extract and parse the header content. Packet characteristic feature representation expressed Parts 1604
The new data packet (of a new IP flow), determined according to the source application of the IP flow based QoS
Requirements, and identify the user receives the IP stream CPE station. Packet classification part of the new 1606
IP data traffic classification into multiple priority levels one. Category 1606 may include, for example having a group
Packet similar QoS requirements. IP data streams presents 1608 Initializes a new IP data stream and it
Presented to the uplink flow scheduler 634.
...
Each time the CPE station 294d try uplink direction communication with the wireless base station 302,
It is inserted by the RRB uplink subframe to request reservation. Then uplink frame scheduler
634 in the uplink subframe in the future schedule reservation request and inform the CPE station 294d reserved. Next
The downlink signal, the radio base station 302, preferably in the uplink flow scheduler 634 at a particular
The future frame transmitted in time slots reserved for the CPE station 294d required uplink transmit its
Data. Uplink flow scheduler 634 from the downlink flow scheduler 604 used for the downlink
The same parameter assignment of the reservation. In other words, the uplink flow scheduler 634 according to the queue
Level priority and according to a set of rules to determine the reserved slots, scheduling the set aside for the use case
Advance reservation algorithm such as CPE station 294d from the user performs uplink transmission. Based on multi-level through from
The priority processor module 1674 to the uplink scheduler 634 of the input stream, virtual private network
(VPN) enabled directory (DEN) data sheet 1672 and the business layer Agreement (SLA) priority data
1670 determining the rules table. Referring to Figure 14 describes the advanced reservation algorithm.
...
Each time the CPE station 294d try uplink direction communication with the wireless base station 302,
It is inserted by the RRB uplink subframe to request reservation. Then uplink frame scheduler
634 in the uplink subframe in the future schedule reservation request and inform the CPE station 294d reserved. Next
The downlink signal, the radio base station 302, preferably in the uplink flow scheduler 634 at a particular
The future frame transmitted in time slots reserved for the CPE station 294d required uplink transmit its
Data. Uplink flow scheduler 634 from the downlink flow scheduler 604 used for the downlink
The same parameter assignment of the reservation. In other words, the uplink flow scheduler 634 according to the queue
Level priority and according to a set of rules to determine the reserved slots, scheduling the set aside for the use case
Advance reservation algorithm such as CPE station 294d from the user performs uplink transmission. Based on multi-level through from
The priority processor module 1674 to the uplink scheduler 634 of the input stream, virtual private network
(VPN) enabled directory (DEN) data sheet 1672 and the business layer Agreement (SLA) priority data
1670 determining the rules table. Referring to Figure 14 describes the advanced reservation algorithm.
...
Packet header identification unit 1602 according to the contents of the packet header recognition from the CPE
Station 294d receives the IP stream.
Packet stream, also known as multiple IP streams from a packet (i.e., with a single "call" the
Each IP flow) in the packet header identification component 1602 is received. In one embodiment of the IP flow from a
Or more user station transmitted to the CPE station 120d 294d, for uplink transmission to the through several
According to the network 142 is connected to the radio base station 302, the host computer 136a. Users can send CPE station 294d
IP packet stream to the packet header identification component 1602, packet buffer module 1610. In
One embodiment, the packet header identification component 1602 within the CPE subscriber station 294d. In the module
1610, received packets buffered in the storage area for transfer to the first extraction module 1620. In
Module 1620, a packet extracting and parsing the header file to get the data packet header fields
Content.
...
Packet stream, also known as multiple IP streams from a packet (i.e., with a single "call" the
Each IP flow) in the packet header identification component 1602 is received. In one embodiment of the IP flow from a
Or more user station transmitted to the CPE station 120d 294d, for uplink transmission to the through several
According to the network 142 is connected to the radio base station 302, the host computer 136a. Users can send CPE station 294d
IP packet stream to the packet header identification component 1602, packet buffer module 1610. In
One embodiment, the packet header identification component 1602 within the CPE subscriber station 294d. In the module
1610, received packets buffered in the storage area for transfer to the first extraction module 1620. In
Module 1620, a packet extracting and parsing the header file to get the data packet header fields
Content.
...
For IP flows known to the system, the existing IP flow identification table 1626 with an inlet. If you have
The identified existing IP data call to the IP stream before a data packet, the IP flow in the system. In
Module 1622 to determine the IP stream and the input table entry exists between 1626 match. If it is,
The IP flow system is known, and control is transferred to the data packet 1604 modules feature presentation components
1630.
If the IP stream is not known from the prior flow of the system, it indicates that the IP flow is a new IP flow,
Then control is transferred to block 1624, the analysis of data in the packet header field to identify the IP stream source
Application.
Packet header analysis module 1624 data from the source application to determine packet header table generated 1628
The IP flow source application type. Application may be any one described with reference to FIG. 2D or skill in the art
Personnel known art the type of application. Examples include from another client workstation 138f download file
File transfer protocol (FTP), from a caller 124d (through a modem) voice phone calls
Called fax calls, and from multiple callers 124d and 126d (through a modem) for
Conference calls, and so on. If the IP flow is a new IP flow, information about the new IP flow identification information added
1626 to the table, the control module from the analysis of 1624 data packets sent to the characteristics of the model formulation components 1604
Block 1632.
...
Packet header analysis module 1624 data from the source application to determine packet header table generated 1628
The IP flow source application type. Application may be any one described with reference to FIG. 2D or skill in the art
Personnel known art the type of application. Examples include from another client workstation 138f download file
File transfer protocol (FTP), from a caller 124d (through a modem) voice phone calls
Called fax calls, and from multiple callers 124d and 126d (through a modem) for
Conference calls, and so on. If the IP flow is a new IP flow, information about the new IP flow identification information added
1626 to the table, the control module from the analysis of 1624 data packets sent to the characteristics of the model formulation components 1604
Block 1632.
...
Packet characteristic feature presentation component 1604 and IP flow presentation of the transfer of the data packets
1606 class components used for classification.
Packet characteristic feature presentation component 1604 and IP flow presentation of the transfer of the data packets
1606 class components used for classification....
If the IP stream is new, the control unit from the packet header identifies the components of the module 1624 1602
Transferred to the module 1632. 1624 to determine if the module and IP streaming applications related to the application system does not
That, in the IP flow QoS requirements search module 1632 IP flows associated with the QoS requirements of the application.
Module 1632 IP flow QoS requirements through the search table 1634 application to perform this operation. Different
Applications have different requirements. For example, the bandwidth allocation (ie, allocating appropriate amount of bandwidth) for the implementation of FTP
Download the application is important, and not jitter (ie, time synchronization data is received) and latency
(Ie, in response to the amount of time between the past). On the other hand, jitter and latency and voice telephony and
Conference call is very important and the bandwidth allocation is not important.
...
If the IP stream is new, the control unit from the packet header identifies the components of the module 1624 1602
Transferred to the module 1632. 1624 to determine if the module and IP streaming applications related to the application system does not
That, in the IP flow QoS requirements search module 1632 IP flows associated with the QoS requirements of the application.
Module 1632 IP flow QoS requirements through the search table 1634 application to perform this operation. Different
Applications have different requirements. For example, the bandwidth allocation (ie, allocating appropriate amount of bandwidth) for the implementation of FTP
Download the application is important, and not jitter (ie, time synchronization data is received) and latency
(Ie, in response to the amount of time between the past). On the other hand, jitter and latency and voice telephony and
Conference call is very important and the bandwidth allocation is not important.
...
5 Classification
Packet Classification 1606 Classification IP streaming components and sends it to the IP flow presentation section 1608 with
In rendering.
For existing IP flow control feature representation from the packet module 1630 transmission parts 1604
To the module 1640. If the module 1630 to determine the packet does not stale, then in 1640 the number of modules
Related to its IP packet stream. 16A, where the processed data packets identified as known to the system
The IP part of the stream. Thus, the module 1632,1636 and 1642 QoS treatment is not necessary,
Because the QoS requirements of the current packet with the same IP flow.
For the new IP flow, control member from the packet characteristic representation module 1636 to the 1604
Module 1642. 1642 in the module, the packet IP flow QoS requirements by performing a search table 1644 is
Classification or grouping to the QoS level, in accordance with the data packet QoS class storage QoS requirements. From the mold
Block 1642, control passes to the IP flow presentation section 1608 of module 1648.
6.IP flow presents
IP stream to prepare and present member 1608 to present flow scheduler 634 IP stream packets. In the upstream
Link direction of an embodiment, the reservation request packet (RRB) and by the establishment of contention slots
Transmitted to the radio base station 302 up for an IP flow scheduler 634 for scheduling. In another
Embodiment, the scheduler in CPE station 294d, so no reservation request.
For an existing IP flow, control member 1640 from the packet classification module 1640 to the mold
Block 1646. In block 1646, the packet is added to the IP flow queue, which is the currently existing IP stream
Queue. In one embodiment, this may include preparing RRB. From the module 1646, control passes to the
Uplink flow scheduler module 1662 634. In one embodiment, this may include from the CPE
294d RRB 302 to the radio base station uplink.
For the new IP flow, control member 1606 from the packet classification module 1642 transferred to the module
1648. 1648 IP stream module initialization, the initialization for the new IP stream presented to the module 1652.
Module 1652 of the IP data flow (specifically, the reservation request block data packet) is presented to the uplink
Flow scheduler module 634 1662. In block 1650, the IP flow QoS class is presented to the scheduler
634, preferably including RRB.
7 uplink flow scheduler
Figure 16B, for the uplink flow scheduler 634 includes a logic flow diagram of an exemplary IP streams
QoS class queuing processor module 1662, MAC uplink subframe scheduler module 1666, the base
In multi-level priority processor module 1674, VPNDEN data table module 1672, SLA priority
Level data sheet 1670, CPE IP flow queue depth status processor 1682 processor and link layer confirmation
Module 1678.
Figure 16B uplink flow scheduler 634 also includes QoS class queue for one,
1664a; 2 级, 1664b; 3 级, 1664c; 4 级, 1664d; 5 级, 1664e; and 6,
1664f; and MAC uplink subframe: Frame n 1668a; frame n +1,1668 b; frame n +2,1668 c;
Frame n +3,1668 d, ... frame n + p, 1668k.
In one embodiment, the uplink flow scheduler 634 radio base station 302 located in the physical, but
Skill in the art will recognize that the same functionality can be located far from the ground radio base station 302
Side. For example, in another embodiment, the uplink flow scheduler 634 may be located CPE station 294d
CPE with the other radio base stations 294 and 302 communicate.
Uplink flow scheduler 634 for scheduling uplink subframe. The entire frame can be divided into pairs
Transmitting uplink frames in the uplink portion (called an uplink subframe) for transmitting downlink
Downlink link frame portion (called a downlink subframe).
16B shows WAP antenna 290d, the wireless medium, RF transceiver subscriber antenna 292d,
Users and user workstations CPE station 294d 120d. WAP antenna and RF transceiver 290d Users days
Line 292d respectively radio base station 302 (in this uplink flow scheduler 634 in an embodiment of the
In), and between the CPE station 294d wireless connection, which is available from running on the client computer 120d
The application uplink transmission line IP flow. WAP acts as an antenna 290d 142 wireless data network gateway, RF
Subscriber antenna transceiver station 294d 292d as the CPE wireless gateway for uplinking IP
Packet data stream.
Also shown in Figure 16B the data interface 320, which provides flow from the uplink scheduler 634 sends
Uplink IP flow packet data network 142 directly to the router 140d and data directly to the destination host
136a is connected to the computer. These connections are also shown in Figure 2D and 3B is shown.
A previous frame including a radio base station received from the CPE station 294d uplink reservation requests.
At this point, reservation request packet has been identified, feature presentation, classification and presentation of the best in the CPE
Station 294d, and an uplink from the CPE 294d stream analyzer 632 to the uplink stream transmission scheduling
634. In particular, the reservation request packet from the module 1650 is presented to the IP flow QoS class queuing at
Processor module 1662. MAC module 1662 Notification uplink subframe scheduler 1666 of the reservation.
In turn, MAC uplink subframe scheduler 1666 using the sub-frame in a time slot
Acknowledge receipt confirmation request packets (ARB) call requests. Demonstration for transporting frame slots
Set aside for this time slot and the IP flow identifier described with reference to Figure 12. Scheduler 1666 when this reservation
CPE gap identification data transmission, as well as requesting user CPE station 294d slot and frame allow future
IP packet for requesting an uplink stream transmission.
For example, according to the multi-level from the priority-based processor module 1674, VPN DEN data
Table 1672 and service level agreements (SLA) priority data table 1670 allocated in the future when the future of the frame
Clearance. These components act in a similar manner based on multi-level priority processor module 1574,
VPNDEN data sheet 1572 and the service level agreement (SLA) priority data table 1570, as the reference
According to the downlink of said scheduler 604.
When an IP flow QoS class queuing processor module 1662 IP stream from the existing rendering module 1608 receives
Or the new IP packet stream, then creates class queues 1664a-1664f, which is a variable of the queue
The number of packets and the data placed in the queue in these levels. In the preferred embodiment, there are three
To 10 levels. These include the reservation request packet queue for scheduling. Packets according reserved
Request packet content into class queue 1664a-1664f used for input to the module 1662.
Module receives data from 1662 based on multi-level priority processor module 1674, VPN DEN
Data Sheet 1672 and service level agreements (SLA) priority data table 1670 entries. Module 1662
Queuing function is based on these inputs. The functions of these components is similar to the downlink scheduling side stream
Law counterpart. SLA priority data sheet data sheet 1672 1670 and VPNDEN received from the operation
, Manage, maintain and supply (OAM & P) module 1108 inputs. OAM & P Module 1108
Provide priority updates, for example, when the user changes the business layer protocol or VPN reservation changes.
MAC uplink subframe scheduler 1666 used in the class queue queuing 1664a-1664f
Request and schedule frame 1668a-1668k slots in the reservation, which is a variable number of frames. In one embodiment,
Example, the schedule of each frame until 1664a-1664f from each grade predetermined limit on the number of data packets
Or percentage limits. These requests can schedule shown in Figure 13, taking into account the specific priority.
In another embodiment according to the present invention, reservation algorithm ahead of schedule frame, for scheduling reference
Figure 14, wherein the type of business, etc.. In another embodiment, the conventional methods and present
Advance reservation algorithm specified combination of scheduling frames.
Then use the reserved slot scheduling example, in Figure 12F of 1236g and 1236h of FDB slots down
Sent to the CPE station 294. Uplink slot then the CPE station 294d is inserted into the uplink sub-frame for the
The scheduler. Frame slot and then upwards from the CPE station 294d to the wireless base station 302, then as the number of
According to the packet transmission to their destination addresses. For example, from the radio base station 302, the packet can be
Data network 142 to the host computer 136a.
The radio base station 302 receives uplink data packets, the wireless base station 302 the uplink recognized
Packet (UAB) message sent back to the CPE station 294d, to confirm receipt of the number of transmission
According to the package. Occasionally, a packet by noise or other interference in the wireless medium is lost. When this happens the
At present, the CPE station 294d sure that it has not received confirmation UAB data, so it via WAP
290d to the radio base station 302 transmits a retransmission request to the other uplink reserved slots, WAP
290d transmit the request to the link layer confirmation (ARQ) processor 1678. ARQ processor 1678 notification
MAC uplink subframe scheduler 1666 to be retransmitted (i.e., to a time slot reserved for re-
Send uplink packets). CPE subscriber station 294d can also be sent to the ARQ processor 1678 About
Did not receive the uplink transmission of other data messages recognized. This can eliminate ARQ 1678
Information delivery to the uplink subframe scheduler 1666. Uplink subframe scheduler 1666 from the appropriate
Re-class queue 1664a-1664f reserved uplink scheduling request. Or, in another instance
Embodiment, the link layer processor 1678 can also confirm to the user CPE station 294d send an affirmative
UAB confirmation to indicate that the packet has been received correctly. Therefore, in addition to the uplink scheduler 1666
Scheduling the first time set aside, the lost packets can also schedule recurring reservations.
...
Each user CPE station 294d has a limited amount of storage space available for queued data packets, which
These data packets from the user station 120d and waits to receive the radio base station 302 from the uplink CPE294d
Link reserved slots. For example, when the user CPE station 294d queue waiting upstream from the reserve set aside
When a packet becomes full, IP data flows may be potentially or packet loss may become obsolete.
In this scenario, the user CPE station 294d sending CPE IP flow queue depth of the message to the wireless base 1680
Station 302 indicates that the queue is full, the message may CPE IP flow queue depth status processor 1682
Reception. MAC processor 1682 notifies the uplink subframe scheduler 1666 of this situation, it would Example
As a temporary increase in the CPE IP streaming station 294d priority in order to overcome the backlog of business, or
Will stop sending such additional downlink data packet to the CPE station 294d, until the queue depth plot
Business pressure is reduced to an acceptable level again. Processor 1682 can also send messages to the MAC
Uplink subframe scheduler 1666 to flush the class queue 1664a-1664f from the CPE
Station 294d reservation requests.
...
Each user CPE station 294d has a limited amount of storage space available for queued data packets, which
These data packets from the user station 120d and waits to receive the radio base station 302 from the uplink CPE294d
Link reserved slots. For example, when the user CPE station 294d queue waiting upstream from the reserve set aside
When a packet becomes full, IP data flows may be potentially or packet loss may become obsolete.
In this scenario, the user CPE station 294d sending CPE IP flow queue depth of the message to the wireless base 1680
Station 302 indicates that the queue is full, the message may CPE IP flow queue depth status processor 1682
Reception. MAC processor 1682 notifies the uplink subframe scheduler 1666 of this situation, it would Example
As a temporary increase in the CPE IP streaming station 294d priority in order to overcome the backlog of business, or
Will stop sending such additional downlink data packet to the CPE station 294d, until the queue depth plot
Business pressure is reduced to an acceptable level again. Processor 1682 can also send messages to the MAC
Uplink subframe scheduler 1666 to flush the class queue 1664a-1664f from the CPE
Station 294d reservation requests.
...
TCP is a reliable transport protocol, suitable for use in congestion packet loss is mainly due to the
Performed in traditional networks. However, a wireless network link bit error incurred due to a significant
Loss. Wireless environment violates many assumptions made by TCP, causing degraded end performance.
See, for example Balakrishnan, H., Seshan, S. and Katz, RH, "Improvement in a cellular radio network, transmitted reliably
Transport and handoff performance ", CA, Berkeley The University of California, Berkeley, in UR1,
http://www.cs.berkeley.du/ ~ ss / papers / winet / html / winet.html, accessible via the Internet, and more
Directly deal with narrowband wireless environment handover and error, here incorporated into its content as
Reference. Improved TCP attempt to modify this problem to overcome this problem. However, there is a commercial
Viable means can overcome this challenge. Need to change the TCP standard operating any of the solutions
Are not implemented.
...
TCP is a reliable transport protocol, suitable for use in congestion packet loss is mainly due to the
Performed in traditional networks. However, a wireless network link bit error incurred due to a significant
Loss. Wireless environment violates many assumptions made by TCP, causing degraded end performance.
See, for example Balakrishnan, H., Seshan, S. and Katz, RH, "Improvement in a cellular radio network, transmitted reliably
Transport and handoff performance ", CA, Berkeley The University of California, Berkeley, in UR1,
http://www.cs.berkeley.du/ ~ ss / papers / winet / html / winet.html, accessible via the Internet, and more
Directly deal with narrowband wireless environment handover and error, here incorporated into its content as
Reference. Improved TCP attempt to modify this problem to overcome this problem. However, there is a commercial
Viable means can overcome this challenge. Need to change the TCP standard operating any of the solutions
Are not implemented.
...
Reliable transport protocols such as TCP for traditional wired networks. TCP congestion cited by adapting
From end to end delay and packet loss in the network in such a good run. TCP through Paul
Held successive estimates the average round-trip delay and the average deviation, and by retransmitting at four times the average
Deviation does not receive any packets recognized to provide reliability. Because cable networks are relatively
Low error rate, all packets are assumed to be lost due to congestion.
Reliable transport protocols such as TCP for traditional wired networks. TCP congestion cited by adapting
From end to end delay and packet loss in the network in such a good run. TCP through Paul
Held successive estimates the average round-trip delay and the average deviation, and by retransmitting at four times the average
Deviation does not receive any packets recognized to provide reliability. Because cable networks are relatively
Low error rate, all packets are assumed to be lost due to congestion....
The invention will be maintained at the packet level queue, waiting for the user CPE stations receive confirmation.
Then the wireless base station to the user performs a local retransmission CPE station retransmitting unacknowledged data slots.
Through a loss is detected on repeat identification packet loss recognition and execution of local retransmission, wireless
The transmission by the base station can avoid the radio link error rate inherently high. Especially the very low-pass
Communication quality and the instantaneous situation can be temporarily disconnected conceal the sender.
For hosts from the CPE to the radio base station host data transfer, the radio base station detects
To missing data packets and they generate a negative acknowledgment. Negative acknowledgment that the data packet can be requested from the
CPE host (sender) retransmission. CPE users host then handles the negative acknowledgment resend phase
To be missing data packets. Advantageously, the modified TCP sender or TCP receiver is not necessary,
Since the present invention will focus on the function of TCP placed in the MAC layer.
Figure 5A illustrates the process 500, described from the user's host IP stream source TCP, down to the protocol
Stack for transmission through the CPE subscriber station, the radio base station via the wireless medium, up through the free
The radio base station protocol stack, the radio base station affiliated with the instance TCP proxy, and a wired connection
Access and adoption of the protocol stack to reach the destination host. Improved transmission subsidiary of TCP TCP proxy TCP sliding
Moving window method of operation and with the access technology based on intelligent multi-media (PRIMMA) Media Access
Control (MAC) cooperate to allow the wireless medium according to the present invention, by local re-issued.
Specifically, the process 500 Description IP packet stream from the user's workstation 120d, through the CPE
Location of the user's CPE subscriber station 306d 294d, and through the wireless transmission medium to the radio base station
302, the last data network 142 through wired links to the main station 136a.
TCP affiliated agency 510e wireless medium by optimizing the window to change the way the TCP transmission
TCP sliding window algorithm operations to ensure reliable delivery. TCP affiliated agency 510e as a proxy for
The industry standard protocol processing 510c is transparent, without changing the client or host user station 120d
Standard workstation 136a TCP / UDP layer.
Process 500 includes IP flow from the application layer 512a, down through the protocol stack TCP / UDP layer 510a,
The IP layer 508a, then through the point (PPP) layer 520a, and through the data link Ethernet
Layer 504a, then through 10BaseT Ethernet network interface card (NIC) physical layer 502a, through
User CPE 294d cable to a 10BaseT Ethernet NIC Physical layer 502b.
User CPE 294d transfer from NIC 502b incoming packets through the Ethernet protocol stack up
Network layer 504b, 520b and through PPP layer 520c, down through PRIMMA MAC 504c to the package
Including antenna 292d of wireless physical layer 502c, and the radio base station through a wireless medium 302 days
Line 290d.
The radio base station 302 to transmit data packets from the IP flows in the physical layer 502d via antenna 290d
PRIMMA MAC layer 504d, through the PPP layer 520a, 508d through the IP layer attached to the TCP proxy
510e, which can flow through the IP layer IP 508e, through PPP layer 520e, via WAN
(WAN) layer 504e, through the wired physical layer 502e, through interface 320, through the router 140d,
Through the data network 142, via a wired connection to the WAN host workstation 136a wired layer 502f.
Host workstation 136a transmit IP traffic from wired layer 502f, up through the protocol stack, through the WAN
Layer 504f, through the PPP layer 520f, 508f through the IP layer to the TCP / UDP layer and reach the application layer 510f
512f.
TCP / UDP layers 510a and 510f provide this transfer function, such as segmentation, management transfer window
Mouth, reordering, and request retransmission of lost data packet stream. TCP layer 510a and 510f are usually sent
A window of data packets, and then wait for confirmation or retransmission request. TCP sliding window algorithm often
For changing the transport stream to deliver optimized transmission and retransmission requests when received when congestion is detected fallback.
Unfortunately in the wireless environment, due to the high error rate, not all of the data packets can reach the destination
To address, not because of congestion, but because of the high error rate to the letter from the destination IP host
Source prompt retransmission request. Not slow transmission, TCP affiliated agency 510e improve TCP sliding window
Algorithm operation to optimize the wireless operation. PRIMMA MAC layer 504d affiliated with TCP
Agent 510e interactions, allowing agents truncation for example, from the user's workstation's TCP layer 510a 120d
Reach the host 136a retransmission requests and allows wireless base station retransmitted packets or flows expected to use
User workstation 120d, instead of transporting a retransmission request to the host 136a, since packets can still be
Stored in PRIMMA 504d queue without being removed until the CPE receives from the user receives correct
Recognition. Because the retransmission according to the present invention PRIMMA MAC data link layer, the layer 2 is performed,
Then re-emit now from the base station to the CPE users, without the need to send source TCP retransmission from beginning to end,
This will cause the back to its TCP sliding window algorithm. Therefore, the radio base station 302 through retransmission until
Received over the wireless link is confirmed, it can overcome the inherently high bit error rate, while maintaining optimal TCP
Window.
...
TCP / UDP layers 510a and 510f provide this transfer function, such as segmentation, management transfer window
Mouth, reordering, and request retransmission of lost data packet stream. TCP layer 510a and 510f are usually sent
A window of data packets, and then wait for confirmation or retransmission request. TCP sliding window algorithm often
For changing the transport stream to deliver optimized transmission and retransmission requests when received when congestion is detected fallback.
Unfortunately in the wireless environment, due to the high error rate, not all of the data packets can reach the destination
To address, not because of congestion, but because of the high error rate to the letter from the destination IP host
Source prompt retransmission request. Not slow transmission, TCP affiliated agency 510e improve TCP sliding window
Algorithm operation to optimize the wireless operation. PRIMMA MAC layer 504d affiliated with TCP
Agent 510e interactions, allowing agents truncation for example, from the user's workstation's TCP layer 510a 120d
Reach the host 136a retransmission requests and allows wireless base station retransmitted packets or flows expected to use
User workstation 120d, instead of transporting a retransmission request to the host 136a, since packets can still be
Stored in PRIMMA 504d queue without being removed until the CPE receives from the user receives correct
Recognition. Because the retransmission according to the present invention PRIMMA MAC data link layer, the layer 2 is performed,
Then re-emit now from the base station to the CPE users, without the need to send source TCP retransmission from beginning to end,
This will cause the back to its TCP sliding window algorithm. Therefore, the radio base station 302 through retransmission until
Received over the wireless link is confirmed, it can overcome the inherently high bit error rate, while maintaining optimal TCP
Window.
...
TCP affiliated agents send TCP and by improving its transmission window algorithms to improve the normal
TCP operation. TCP affiliated agents such as preventing copying through retransmission request to prevent the transmitter is connected
TCP received notification is lost, that receives congestion notification. Because sending TCP does not receive such notification,
It does not change the TCP sliding window with a higher rate and the transmission continues.
If there is a real congestion, ie if the TCP packet identification subsidiary agency really lost,
The TCP retransmission affiliated agents can make requests arrive send TCP. This can be achieved advantageous, because
The MAC layer of the present invention with a higher link layer communication protocol, which focus on the application, transmit and focus
Focus on network. In this case, because the MAC layer is the transport layer, PRIMMA MAC layer 504d
In the layer 4 and the TCP communication sub agent 510e. Because the need for each of the MAC from the wireless base station 302
Transmitted data packet to the CPE subscriber station 294d reception confirmation wireless transmission, MAC layer 504d
That the communication between the TCP layer, such as a retransmission request, if the client computer from the CPE station TCP
Transmission, because the data packets are lost in the wireless transmission congestion, or because the actual loss.
...
If there is a real congestion, ie if the TCP packet identification subsidiary agency really lost,
The TCP retransmission affiliated agents can make requests arrive send TCP. This can be achieved advantageous, because
The MAC layer of the present invention with a higher link layer communication protocol, which focus on the application, transmit and focus
Focus on network. In this case, because the MAC layer is the transport layer, PRIMMA MAC layer 504d
In the layer 4 and the TCP communication sub agent 510e. Because the need for each of the MAC from the wireless base station 302
Transmitted data packet to the CPE subscriber station 294d reception confirmation wireless transmission, MAC layer 504d
That the communication between the TCP layer, such as a retransmission request, if the client computer from the CPE station TCP
Transmission, because the data packets are lost in the wireless transmission congestion, or because the actual loss.
...
Accordingly, the present invention is a TCP subsidiary agent 510e can best way to improve wireless medium
TCP sliding window algorithm operation without the need for the receiver and the transmitter host of commercially available
Using TCP layer 510a and 510f to make any changes. In one embodiment, TCP sub agent 510e
No need to change the transmission (i.e. transmission) host or client TCP layer. In another embodiment,
Host and client TCP layer does not know the operation of changing the TCP affiliated agency, that its source and destination
Is transparent to the TCP layer. In another embodiment, TCP connections to cut sub agent 510e
User CPE station client computer TCP layer and connected to the data network host workstation TCP layer
Between the retransmission request.
...
Accordingly, the present invention is a TCP subsidiary agent 510e can best way to improve wireless medium
TCP sliding window algorithm operation without the need for the receiver and the transmitter host of commercially available
Using TCP layer 510a and 510f to make any changes. In one embodiment, TCP sub agent 510e
No need to change the transmission (i.e. transmission) host or client TCP layer. In another embodiment,
Host and client TCP layer does not know the operation of changing the TCP affiliated agency, that its source and destination
Is transparent to the TCP layer. In another embodiment, TCP connections to cut sub agent 510e
User CPE station client computer TCP layer and connected to the data network host workstation TCP layer
Between the retransmission request.
...
In step 526, the message parsing outgoing TCP 524 TCP header content to display from
User workstations 120d via wireless networks to transmit the contents of messages sent by the host 136a.
In step 528, to determine whether the contents of the TCP header includes a copy from the CPE station confirmation message
Interest. Receiving a copy of the user's location from the CPE confirmation request may indicate loss of the wireless medium
Message, or a real congestion problem. If, at step 528, TCP data packet determined to be a
Copy confirmation message, the process proceeds to step 532, and if not, the process proceeds to step 530.
In step 530, determine the real congestion, ie not in the radio link layer retransmission attempts
Cause a copy of the confirmation message. Thus, at step 530, TCP message allows no change in transmission
The TCP sub 510e, and can continue through flow 500 to TCP layer of Figure 5A 510f.
In step 532, step 528 is detected as the copy confirmation, it is determined whether or not successfully transmitted
Packet. The TCP affiliated agents and PRIMMA MAC layer 504d 510e internal communication between the
Step 532. This is the line 428 shown in Figure 4 the PRIMMA MAC and higher layers protocols interactivity
Instance. PRIMMA MAC layer 504d can identify whether the packet is successful from the radio base station 302
Sent to the CPE station 294d, as shown in Figure 15B, a retransmission request from the link layer 1576 are recognized
(ARQ) processor 1578 of the CPE station 294d receives the MAC downlink subframe scheduler 1566,
Attention in the future frame scheduler 1568 1566 lost packet retransmission. If, at step 532, determine
The transmitted packet is successfully set, the process may continue to step 530, described above. However, if
Determine whether the data packet is not successfully transmitted, the process proceeds to step 534.
...
In step 532, step 528 is detected as the copy confirmation, it is determined whether or not successfully transmitted
Packet. The TCP affiliated agents and PRIMMA MAC layer 504d 510e internal communication between the
Step 532. This is the line 428 shown in Figure 4 the PRIMMA MAC and higher layers protocols interactivity
Instance. PRIMMA MAC layer 504d can identify whether the packet is successful from the radio base station 302
Sent to the CPE station 294d, as shown in Figure 15B, a retransmission request from the link layer 1576 are recognized
(ARQ) processor 1578 of the CPE station 294d receives the MAC downlink subframe scheduler 1566,
Attention in the future frame scheduler 1568 1566 lost packet retransmission. If, at step 532, determine
The transmitted packet is successfully set, the process may continue to step 530, described above. However, if
Determine whether the data packet is not successfully transmitted, the process proceeds to step 534.
...
In step 536, TCP affiliated agents can wait PRIMMA MAC 504d 510e notice in
Link Layer Processor 1578 confirmed the success of lost packets received link layer retransmission. From step 536,
Process may continue to step 538.
In step 538, a receipt PRIMMA MAC 504d link layer retransmission confirmation of success,
Can return to normal TCP messages.
In another step (not shown), TCP sub agents and PRIMMA MAC layer may be provided
Retransmission attempts threshold, if it reaches the threshold, the process may proceed to step 530 to allow TCP
Transmission of the message is not modified.
Figure 5C illustrate a flow chart 540 features, including TCP TCP affiliated agency 510e execution into bullying
Examples of functional description cheat function. See Figure 5C and 5A, FIG user station transmission 540 assumes
The TCP layer 510a 120d has to transmit a packet data window to the host 136a, and wait
Confirm. Figure 544 illustrates a TCP subsidiary radio base station 302 receives the input to the TCP proxy consumer 510e
Bearing 542, the message has changed from the host workstation 136a sent via data network 142, via a wireless media
Refer to the user's workstation users CPE 294d to 120d.
In step 544, the message parsing input TCP 542 TCP header content to display
136a through wireless network from the host to send the user's workstation 120d content of messages sent.
In step 546, to determine whether the contents of the TCP header includes a copy of confirmation from the host 136a
Messages. Receiving a copy of the confirmation request from the host to indicate the loss of messages in the wireless medium,
Or a real congestion problem. If, at step 546, TCP is a copy of the data packet to determine correct
Acknowledgment message, the process proceeds to step 550, and if not, the process proceeds to step 548.
In step 548, determine the true congestion, ie not in the wireless link layer retransmission attempts
Cause a copy of the confirmation message. Thus, at step 548, TCP message allows no change in transmission
The TCP sub 510e, and can continue through flow 500 to TCP layer of Figure 5A 510a.
In step 550, as detected at step 546 the copy confirmation, it is determined whether or not successfully transmitted
Packet. The TCP affiliated agents and PRIMMA MAC layer 504d 510e internal communication between the
Step 550. This is the line 428 shown in Figure 4 the PRIMMA MAC and higher layers protocols interactivity
Instance. PRIMMA MAC layer 504d can identify whether a packet from the CPE station 294d success
To the radio base station 302, as shown in Figure 16B, a retransmission request from the link layer 1676 confirmation (ARQ)
CPE station 294d processor 1678 receives the MAC downlink subframe scheduler 1666, a warning tone
Indexer 1666 1668 in future frame retransmission of lost packets. If, in step 550, determining the number of
Packets successfully transmitted, the process may proceed to step 548, as described above. However, if it is determined that the
Packets are not successfully transmitted, the process proceeds to step 552.
...
In step 550, as detected at step 546 the copy confirmation, it is determined whether or not successfully transmitted
Packet. The TCP affiliated agents and PRIMMA MAC layer 504d 510e internal communication between the
Step 550. This is the line 428 shown in Figure 4 the PRIMMA MAC and higher layers protocols interactivity
Instance. PRIMMA MAC layer 504d can identify whether a packet from the CPE station 294d success
To the radio base station 302, as shown in Figure 16B, a retransmission request from the link layer 1676 confirmation (ARQ)
CPE station 294d processor 1678 receives the MAC downlink subframe scheduler 1666, a warning tone
Indexer 1666 1668 in future frame retransmission of lost packets. If, in step 550, determining the number of
Packets successfully transmitted, the process may proceed to step 548, as described above. However, if it is determined that the
Packets are not successfully transmitted, the process proceeds to step 552.
...
In step 554, TCP affiliated agents can wait PRIMMA MAC 504d 510e notice in
Link Layer Processor 1678 confirmed the success of lost packets received link layer retransmission. From step 554,
Processing can continue to step 556.
In step 556, a receipt PRIMMA MAC 504d link layer retransmission confirmation of success,
Can return to normal TCP messages.
In another step (not shown), TCP sub agents and PRIMMA MAC layer may be provided
Retransmission attempts threshold, if it reaches the threshold, the process may proceed to step 548 to allow TCP
Transmission of the message is not modified.
5 focus on the QoS PRIMMA wireless medium access control (MAC) hardware structure
Figure 10 depicts the hardware structure 1000 PRIMMA MAC embodiments. Structure 1000 represents a number
Two-way data network 142 via a wired connection to the WAN interface 320.
WAN interface 320 bi-directional link to the bi-directional data frame FIFO 1002, its two-way connection to a staging
And reordering (SAR) 1004 and QoS / SLA rules engine and the processor 1008.
QoS / SLA rules engine and the processor 1008 also bi-directional connection to an IP stream buffer 1014 and
Flash random access memory (RAM) 1010.
SAR 1004 bi-directional connection to an IP stream buffer 1014, a flash RAM 1010, QoS / SLA
Rules engine and processor 1008 and PRIMA MAC scheduler ASIC 1012.
PRIMA MAC scheduler ASIC 1012 is also bidirectionally connected to the RF interface 290, a static
RAM (SRAM) cell buffer Wireless IP flow buffers 1018 and 1014.
6 wireless base station software organizations
FIG 11 is a packet-centric wireless point to multipoint communication system of an exemplary soft
Pieces of tissue. Figure 11 software organizations include a wireless transceiver and RF application specific integrated circuits
(ASIC) module 290, IP flow controlling member 1102, WAN interface management component 1104, QoS, and
1106 SLA management components, systems and components OAM & P 1108, customer billing and login parts
1110 directory-enabled networking (DEN) member 1112 and the wireless base station 320.
IP flow control module 1102 includes a transmission line control module 1102a, TCP rate control and business
Level module 1102b, 1102c wireless PRIMMA MAC layer and IP streaming engine identification and analysis module
1102d.
WAN WAN interface management unit 1104 including incoming / outgoing queue control module 1104a,
WAN interface port (e.g. T1, T3, OC3 port) 1104b, 1104c firewall and security modules
And WAN traffic shaping module 1104d.
IP flow control member 1102 and WAN interface management component 1104, a system of the "core" of the number of
According to the packet processing, MAC layer scheduling, TCP agents and WANI / F control functions are located here. Above-mentioned "
Non-core "component of many behavioral support and control these core components.
QoS and SLA management unit 1106 including QoS performance monitoring and control module 1106a, business
Layer protocol module 1106b, 1106c, and encryption policy management module management module 1106d.
QoS and SLA management components required for the system 1106 to provide data at rest, in order to be properly
Grouping to a particular IP flow QoS class. In general, in the preparatory phase of the system installation, service provided
For providers will (remote) and the CPE station 294 download relevant information, including user CPE station SLA,
Age-based policy information (such as working time and the peak data rate tolerance). Encryption
Key or "strength" can also be downloaded, it can be specific to a user or service provider CPE station.
OAM & P component system 1108 includes an SNMP agent WAP module 1108a customers,
CPE module's SNMP agent for customers 1108b and system operation, administration, management and supply model
Block 1108c.
OAM & P component 1108 allows remote operations personnel and equipment monitoring, control, service,
Modify and maintain the system. System performance layer can be automatically monitored, you can set the system traps and
Tracking. OAM & P component using the 1108 control remote testing and troubleshooting services can be solved
User complaints. System capacity limits can be monitored, can appear ahead of supply additional WAN connection,
Cause OAM & P Auto Parts 1108 trend analysis capabilities.
Customer billing and login module 1110 includes counting login and database management module 1110a,
Query and transaction processing control module 1110b, 1110c pay and count control module and user authentication
Module 1110d.
Customer billing and login Parts 1110 allow the service provider to receive the user's account on the system
Households, billing and transaction information. For paid service providers can collect according tired,
Integrable system resource usage data. For specific types of behavior (for example, video conferencing, and multicast
Etc.) have a dedicated billing data collected and transmitted to the service provider. This part also through user authentication
Functional operation of the control system of the validity of the user. Once the user is authorized to use the system, the
Service providers (remote) to make new user authentication entrance. Similarly, the user can further reject
Must access the system, because the non-payment of business or other reasons. Service providers also can contribute to the Department
Remote query system with specific accounts related matters.
...
Customer billing and login Parts 1110 allow the service provider to receive the user's account on the system
Households, billing and transaction information. For paid service providers can collect according tired,
Integrable system resource usage data. For specific types of behavior (for example, video conferencing, and multicast
Etc.) have a dedicated billing data collected and transmitted to the service provider. This part also through user authentication
Functional operation of the control system of the validity of the user. Once the user is authorized to use the system, the
Service providers (remote) to make new user authentication entrance. Similarly, the user can further reject
Must access the system, because the non-payment of business or other reasons. Service providers also can contribute to the Department
Remote query system with specific accounts related matters.
...
DEN Parts 1112 allows service providers to enter into the system based on the user's DEN
VPN operations related information. Users VPNs need to be "initialized" and "supply" and therefore
Normal system assigned to the user with these VPNs system resources and provides the knowledge of these VPNs
Types and operations. The data from the DEN member 1112 is used by the system to use the appropriate priority master
IP streaming to the user.
DEN Parts 1112 allows service providers to enter into the system based on the user's DEN
VPN operations related information. Users VPNs need to be "initialized" and "supply" and therefore
Normal system assigned to the user with these VPNs system resources and provides the knowledge of these VPNs
Types and operations. The data from the DEN member 1112 is used by the system to use the appropriate priority master
IP streaming to the user....
In one embodiment, DEN policy-based network management, IPsec compatible network
Security and IPsec-based VPNs. Wireless base station 302 DEN planning and Common Information Model
(CIM) 3.0 compatible (once the specifications have been finalized). Wireless base station 302 may be supported and support their DEN
Directory-based DEN QoS mechanisms, including the reservable models (ie, RSVP, each flow line) and pre-
/ Priority / difference model (ie, packet marking). Plans to support the wireless base station 302 may DEN Network
Strategy QoS, and until DEN complete, supporting internal QoS and network expansion.
6.IPsec Support
Above with reference to Figure 4 introduces IPsec. IPsec provides a standard method for an encrypted packet. On the VPN
Tunnel mode, the entire unit can be coded in the first, the encryption. In order to achieve the present invention, in several
Oriented packet-centric QoS priority ranking, the identification data packet / IP stream period, the radio base
Station needs to be able to analyze the data packet header field content. Therefore, the analysis of data packets are not encrypted
Desirable.
The present invention through the wireless medium is encrypted before the transmission frame data stream, so do not really need
To take advantage of IPsec provides encrypted transmission via a wireless link. Expected use of this service provider
IPsec, IPsec can be used for identification and security header and payload payload data or just
Seal. IPsec is usually integrated in the firewall. If service providers expect the present invention and IPsec,
Then the present invention should be implemented behind a firewall, the firewall can be moved to the wireless base station. This allows the
IPsec end base stream, which can provide access to the data base packet header fields.
Figure 17 illustrates the downlink direction includes the IP streaming IPsec encryption. Similarly, Figure 18 illustrates uplink
Link direction IPsec support the invention.
Figure 17 illustrates the downlink stream 1700, describes the downlink direction from the source host IP stream work
Station 136a, down to support the IPsec protocol stack for uplinking and by connecting to the data network 142
The radio base station 302, through encryption layer, and then through a wireless link to the user CPE 294d, the
CPE 294d by the user protocol stack, and then connected via a wired connection to a data network 142,
Up through the protocol stack to the user's destination user workstation location 306d 120d.
Specifically, flow 1700 Description IP packet flow from the master station 136a, the radio base station
302, then the wireless transmission link to the user CPE 294d, and via a wired link to the user
Workstation 120d.
Host workstation 136a under the IP flow from the application layer 1712h, down through the TCP / UDP layer
1710h, through the IP layer 1708h, through optional PPP layer 1706h, through Ethernet layer 1705h,
Down through the layers 10BaseT 1702h, through data network 142 to a 10BaseT layer 1702g, and then to
Via Ethernet 1704g, stack up through optional PPP layer to the IP layer 1708g 1706g
And 1708h, down through the Internet firewall and IPsec security gateway 1706f, down through the WAN
Layer 1704f, 1702f layer to the data to a wired network 142 to a wired physical layer 1702e.
Wired wireless base station 302 physical layer 1702e 1704e will flow upward through IPWAN layer transfer
To the protocol stack, through IPsec security gateway 1706e and 1708e firewall to the IP network layer and 1708d,
Then down through the encryption layer 1706d, PRIMMA MAC layer 1704d and down to the wireless link,
To the user CPE 294d.
User CPE 294d stream from the IP layer 1702c physical wireless antenna 292d upward through
MAC layer 1704c, through encryption layer 1706c, 1708b, and the IP layer 1708c, and down
Via the optional layer 1706b to connect to a 10BaseT Ethernet layer 1704b 1702b to connect 10BaseT
Pick.
User workstations 120d transmit IP flows from the 10BaseT layer 1702a, up through the protocol stack
Ethernet layer 1704a, through optional PPP layer 1706a, through IP layer 1708a, the
TCP / UDP layer until the application layer 1710a and 1712a.
Figure 18 illustrates an uplink stream 1800, describes IP flow uplink direction from the position at the CPE
306d 120d user workstation information source TCP, the protocol stack for transmission down through the connection
Ethernet CPE subscriber station 294d, through the wireless medium to the radio base station 302, up through the branch
The radio base station 302 holding IPsec protocol stack, and to a data network via a wired connection 142, through the
Protocol stack to the destination host.
Specifically, 1800 Description IP packet flow stream from the user's workstation 120d, through user
CPE 294d, and through the wireless transmission medium to the radio base station 302, and finally through cable chain
Road to the host workstation 136a.
Process 1800 includes IP flow from the application layer 1812a, down through the protocol stack TCP / UDP layer
1810a, through IP layer 1808a, and then select the point (PPP) layer 1806a, then
After the data link Ethernet layer 1804a, then through 10BaseT Ethernet network interface card
(NIC) physical layer 1802a, via a wired connection to a user's CPE 294d Ethernet 10BaseT
NIC physical layer 1802b.
CPE 294d transmit user data input from the NIC 1802b packet up the protocol stack through
Ethernet layer 1804b, 1806b through optional PPP layer to the IP layer 1808b and 1803c, down through
Over the Internet firewall and IPsec security gateway 1806c, down through PRIMMA MAC 1804c
Including antenna 292d of the wireless physical layer 1802c, and then through the wireless medium, such as an RF communication,
RF cables and satellite links to the radio physical layer 1802d antenna of the radio base station 302 290d.
Wireless base station 302 to transmit data packets from the IP flows in the physical layer 1802d wireless antenna
290d, upward through the MAC layer 1804d, 1806d through IPsec layer and 1806d, it can be loaded
Packets and encrypt them. From the IPsec layer 1806e, IP streams can be down through the WAN layer 1804e
And physical layer 1802e via a wired data network 142.
Physical layer 1802f wired up to the delivery of IP protocol stack flows through WAN layer 1804f, through
1806f IPsec security gateway and firewall to the IP network layer 1808f and 1808g, and then down through the available
Select a PPP layer 1806h, Ethernet layer 1804h, down through 10BaseT layer 1802g, through
Interface 320, the router 140d, through data network 142, via a wired connection to the master station 136a
The 10BaseT physical layer 1802h.
IP host workstation 136a will flow from the 10BaseT layer 1802h, pass upward through the protocol stack
Over Ethernet layer 1805h, through optional PPP layer 1806h, through the IP layer 1808h, the TCP / UDP
Layer 1810h, until the application layer 1812h.
w. Conclusions
While the above described various embodiments of the present invention, it should be understood that they only make
Given as an example and not limitation in. Thus, the breadth and scope of the invention should not be from the above
Any restrictions to an exemplary embodiment, but should only from the following claims and equivalents
Definition.